diff --git a/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json b/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json index 5015978cae6..f56bcee6e6a 100644 --- a/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json +++ b/CVE-2019/CVE-2019-190xx/CVE-2019-19049.json @@ -2,8 +2,8 @@ "id": "CVE-2019-19049", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-18T06:15:11.640", - "lastModified": "2024-08-05T02:15:57.810", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T18:44:14.520", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -93,8 +93,52 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "4.4.200", + "matchCriteriaId": "6748ABF8-124E-4304-853C-24C0E719A55B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.200", + "matchCriteriaId": "8F820171-74F9-4002-93B0-7569665CFE05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.153", + "matchCriteriaId": "C55640AE-5371-476C-8C65-148F7E3990C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.83", + "matchCriteriaId": "182277BD-EFC5-494B-888A-F7D12B80E56E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", "versionEndExcluding": "5.3.10", - "matchCriteriaId": "F30BED58-4FF3-46D2-A535-AC5A126D67A3" + "matchCriteriaId": "39BAAF54-1709-4F76-BAA4-A2D183722FEA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493" } ] } @@ -104,11 +148,18 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1157173", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.10", diff --git a/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json b/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json index 314b16f76e7..a92f9a0f9a3 100644 --- a/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json +++ b/CVE-2019/CVE-2019-190xx/CVE-2019-19064.json @@ -2,8 +2,8 @@ "id": "CVE-2019-19064", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-18T06:15:12.607", - "lastModified": "2024-08-05T02:15:58.570", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T19:38:19.673", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -93,8 +93,29 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.3.11", - "matchCriteriaId": "EB2904AC-AD7A-498D-8619-CBB421E9165D" + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.4.13", + "matchCriteriaId": "0C926075-BF14-456C-96D1-0FFA1A4DD150" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", + "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", + "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33" } ] } @@ -104,7 +125,10 @@ "references": [ { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1157300", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86", @@ -116,15 +140,24 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://usn.ubuntu.com/4300-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json index f1fc99b5a7b..03fa800b5bf 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38160.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38160", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-07T04:15:06.967", - "lastModified": "2024-08-04T02:15:30.860", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T19:37:50.600", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -93,8 +93,58 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.24", + "versionEndExcluding": "4.4.276", + "matchCriteriaId": "1DAFBDE6-EDBA-4AB8-9AF9-6359EB1CE1A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.276", + "matchCriteriaId": "C79FFC06-9530-4CD7-B651-01D786CC925E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.240", + "matchCriteriaId": "FB359B2E-773D-4D52-9915-E07A47ABE72B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.198", + "matchCriteriaId": "B93AEDB9-C52B-4222-8F9A-882DAD9EF5B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.134", + "matchCriteriaId": "508D9771-335F-44A6-9F2F-880DF1267A1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.52", + "matchCriteriaId": "7C1E6FB6-53C8-4DC4-8AE5-93094BA39F62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.19", + "matchCriteriaId": "34C1A2F4-DD44-4CF1-8FD4-751A0D746A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", "versionEndExcluding": "5.13.4", - "matchCriteriaId": "4C85356F-2C6C-4FB9-B0CA-949711182223" + "matchCriteriaId": "F93FA3CC-0C79-410B-A7D7-245C2AA0723A" } ] } diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json index fb4eaa7c823..1d9d83f7642 100644 --- a/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json +++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34269", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:35:13.213", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-08-27T18:35:00.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en RWS WorldServer antes de la versi\u00f3n 11.7.3. Un atacante remoto autenticado puede realizar un ataque SSRF ciego ws-legacy/load_dtd?system_id= para implementar c\u00f3digo JSP en el servicio Apache Axis que se ejecuta en la interfaz del host local, lo que lleva a la ejecuci\u00f3n del comando." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://www.rws.com/localization/products/trados-enterprise/worldserver/", diff --git a/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json b/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json new file mode 100644 index 00000000000..1155d0980ce --- /dev/null +++ b/CVE-2022/CVE-2022-399xx/CVE-2022-39996.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-39996", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T18:15:13.197", + "lastModified": "2024-08-27T19:35:01.613", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Teldats Router RS123, RS123w allows attacker to execute arbitrary code via the cmdcookie parameter to the upgrade/query.php page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat%27s%20Router%20Vulnerability.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json b/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json new file mode 100644 index 00000000000..8b3a1d95252 --- /dev/null +++ b/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2022-39997", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T19:15:15.953", + "lastModified": "2024-08-27T19:15:15.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A weak password requirement issue was discovered in Teldats Router RS123, RS123w allows a remote attacker to escalate privileges" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat%27s%20Router%20Vulnerability.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json index eeef63c837c..9feaf8b27e3 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48626", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:45.720", - "lastModified": "2024-04-17T19:28:53.540", + "lastModified": "2024-08-27T18:54:45.263", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -61,50 +61,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16", "versionEndExcluding": "4.9.301", - "matchCriteriaId": "C73D1F55-82C4-4327-92BE-06DB2E9EAA3F" + "matchCriteriaId": "28BA9DF8-A480-4B97-A516-9CF06950A44F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.10.0", + "versionStartIncluding": "4.10", "versionEndExcluding": "4.14.266", - "matchCriteriaId": "51CBF15C-E2C2-46D6-8B44-FD1DBC4B90AA" + "matchCriteriaId": "C53477E7-1AB3-4CCB-BA3A-8CA6D288B41B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.15.0", + "versionStartIncluding": "4.15", "versionEndExcluding": "4.19.229", - "matchCriteriaId": "18A62436-9A1F-4D76-8171-673ABD2F8FF0" + "matchCriteriaId": "E67EAACB-63BB-41E7-9FE0-EC45ECD8CFD0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.20.0", + "versionStartIncluding": "4.20", "versionEndExcluding": "5.4.179", - "matchCriteriaId": "9D555D9E-77E5-4394-B778-A4120D57AF6D" + "matchCriteriaId": "1380BE1A-D9B3-4CB0-A8B3-E24C7ABD8D74" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.5.0", + "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.100", - "matchCriteriaId": "2087D356-66AA-4AF1-9573-7F9CCDF45E69" + "matchCriteriaId": "FA230C44-7F00-4499-93FC-B023912E2BDC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.11.0", + "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.23", - "matchCriteriaId": "D02A8AAA-DFB4-4A35-BFE6-D37996722B78" + "matchCriteriaId": "C188CF31-9B43-49E9-94C5-FE808500CFC8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.16.0", + "versionStartIncluding": "5.16", "versionEndExcluding": "5.16.9", - "matchCriteriaId": "BABAFD2D-69AC-41BE-9833-6304358DA047" + "matchCriteriaId": "9B3CAAA9-722D-4630-BBD7-A16C561ED854" } ] } diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json index 7e66473c848..15ba5e0ef19 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24050.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24050", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T23:15:23.320", - "lastModified": "2024-08-01T13:43:21.560", + "lastModified": "2024-08-27T19:35:03.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "ADJACENT_NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.0, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 2.1, - "impactScore": 5.9 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26266.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26266.json index 8c1eb7c3902..2af0183a44a 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26266.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26266.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26266", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-21T04:15:10.693", - "lastModified": "2023-03-02T23:03:39.530", + "lastModified": "2024-08-27T19:40:05.087", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -18,19 +18,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 1.3, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json index ed79d8a0511..18063dfe11b 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29483.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29483", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T14:15:12.010", - "lastModified": "2024-06-26T02:15:09.210", + "lastModified": "2024-08-27T19:35:04.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "eventlet anterior a 0.35.2, como se usa en dnspython anterior a 2.6.0, permite a atacantes remotos interferir con la resoluci\u00f3n de nombres DNS enviando r\u00e1pidamente un paquete no v\u00e1lido desde la direcci\u00f3n IP y el puerto de origen esperados, tambi\u00e9n conocido como un ataque \"TuDoor\". En otras palabras, dnspython no tiene el comportamiento preferido en el que proceder\u00eda el algoritmo de resoluci\u00f3n de nombres DNS, dentro de la ventana de tiempo completa, para esperar un paquete v\u00e1lido. NOTA: dnspython 2.6.0 no se puede utilizar por un motivo diferente al que se abord\u00f3 en 2.6.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-292" + } + ] + } + ], "references": [ { "url": "https://github.com/eventlet/eventlet/issues/913", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31296.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31296.json index 6a5c182f906..2e99c31527f 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31296.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31296.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31296", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-29T04:15:09.053", - "lastModified": "2024-01-04T23:43:22.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T19:35:05.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1236" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json index 80aeebe07f2..8c4296c8aed 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32247", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.470", - "lastModified": "2023-12-04T14:55:19.007", + "lastModified": "2024-08-27T19:37:30.927", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,8 +92,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", - "versionEndIncluding": "6.1.29", - "matchCriteriaId": "2B654D6F-58B7-4F0A-AA17-3D2366073718" + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.29", + "matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json index 6708ab8eb25..034b32ae1c1 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32252", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.610", - "lastModified": "2023-12-04T14:53:38.480", + "lastModified": "2024-08-27T19:36:38.493", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -88,8 +88,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.29", - "matchCriteriaId": "7E233AD0-DABB-4668-93A7-DD0909B16CB9" + "matchCriteriaId": "D48F00B5-5471-4D1B-BE47-1DAB8122F35A" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36644.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36644.json index cf3167e920a..bada66a1fb2 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36644.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36644.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36644", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T09:15:07.117", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-08-27T18:35:01.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/caffeinated-labs/CVE-2023-36644", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json index 4b954a96f59..ea9087bf269 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38427", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.530", - "lastModified": "2023-11-17T18:55:13.147", + "lastModified": "2024-08-27T18:54:08.123", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -62,8 +62,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.34", - "matchCriteriaId": "4F5A5D4B-4F1F-455D-8917-7785595FACF7" + "matchCriteriaId": "827DE634-7B30-489B-8DA2-F753BE881D9B" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39197.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39197.json index e900b00db0d..a8d1f0fd011 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39197.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39197.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39197", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-23T03:15:11.683", - "lastModified": "2024-01-30T02:04:00.813", + "lastModified": "2024-08-27T19:31:28.257", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,8 +90,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.26", + "versionEndExcluding": "5.4.251", + "matchCriteriaId": "79658A41-FEEA-42AF-93D9-A85F7CF2123A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.188", + "matchCriteriaId": "43CAE50A-4A6C-488E-813C-F8DB77C13C8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.121", + "matchCriteriaId": "EC77775B-EC31-4966-966C-1286C02B2A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.39", + "matchCriteriaId": "9BD1D4A1-304D-4187-8178-6D7C0050B1AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.3.13", + "matchCriteriaId": "95CB4836-7F5D-4C20-B025-8E046EC87B78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.4.4", + "matchCriteriaId": "6AB81046-CB69-4115-924C-963B37C41385" } ] } diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40106.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40106.json index ee704238a55..aae83eb4f2c 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40106.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40106.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40106", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.137", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-08-27T19:35:06.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En sanitizeSbn de NotificationManagerService.java, existe una forma posible de iniciar una actividad desde segundo plano debido a BAL Bypass. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/442b4390c1f04b0e74ae4a7e349418dad4e7522e", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json index 9e536c2a59d..96dc6f72936 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42936.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42936", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:08.200", - "lastModified": "2024-04-08T22:47:26.453", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T19:35:06.893", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43481.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43481.json index 29b2e03d6e8..5db226af2c2 100644 --- a/CVE-2023/CVE-2023-434xx/CVE-2023-43481.json +++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43481.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43481", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-27T21:15:07.990", - "lastModified": "2024-01-04T16:15:04.757", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T19:35:07.137", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json index 5d29441cabb..27873f7493d 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45871", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-15T01:15:09.027", - "lastModified": "2024-01-11T19:15:11.530", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T19:35:21.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,8 +61,73 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4", + "versionEndExcluding": "4.14.326", + "matchCriteriaId": "8B86C2DA-9296-4581-91E9-2B5E6160BCB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.295", + "matchCriteriaId": "D419C7D6-F33D-4EF8-8950-1CB5DDF6A55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.257", + "matchCriteriaId": "834BD148-28EC-43A4-A4F5-458124A1E39F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.195", + "matchCriteriaId": "C385B650-53DB-4BFB-83D1-1D8FADF653EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.132", + "matchCriteriaId": "5913891D-409A-4EEC-9231-F2EF5A493BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.53", + "matchCriteriaId": "B20754AF-3B8C-4574-A70D-EC24933810E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.4.16", + "matchCriteriaId": "C3039EA3-F6CA-43EF-9F17-81A7EC6841EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", "versionEndExcluding": "6.5.3", - "matchCriteriaId": "94CF2054-EF6D-4135-876E-2925F10BCC0F" + "matchCriteriaId": "880C803A-BEAE-4DA0-8A59-AC023F7B4EE3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" } ] } @@ -87,7 +152,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0001/", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json index e2e41549f33..a3e3c2ea671 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46838", "sourceIdentifier": "security@xen.org", "published": "2024-01-29T11:15:07.933", - "lastModified": "2024-06-27T12:15:13.670", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T19:25:43.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -62,8 +62,50 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.14", - "versionEndExcluding": "6.7", - "matchCriteriaId": "CD62E8EA-4051-4EB9-AE74-F2A7B7F8FE13" + "versionEndExcluding": "4.19.306", + "matchCriteriaId": "245BC69A-0457-423B-9265-433DFB832C22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" } ] } @@ -88,16 +130,39 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "security@xen.org" + "source": "security@xen.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "security@xen.org" + "source": "security@xen.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/", diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json index 6aa44643593..30f573d6be4 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47678.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47678", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-11-15T02:15:06.800", - "lastModified": "2024-08-02T22:15:20.000", + "lastModified": "2024-08-27T19:35:07.937", "vulnStatus": "Modified", "cveTags": [ { @@ -56,16 +56,6 @@ "value": "NVD-CWE-Other" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49231.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49231.json index 9a45dfcbc0b..9e4014a4b4f 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49231.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49231.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49231", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T16:15:07.970", - "lastModified": "2024-04-05T17:15:07.567", + "lastModified": "2024-08-27T19:35:08.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Stilog Visual Planning 8. Permite que un atacante no autenticado reciba un token de API administrativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Apr/1", diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51051.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51051.json index d9358f9b8ac..c8a58958b0a 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51051.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51051.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51051", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-21T16:15:11.110", - "lastModified": "2023-12-29T03:47:42.610", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T19:35:09.037", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51828.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51828.json index 4009c6ec3a8..d1aa991c65e 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51828.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51828.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51828", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T22:15:48.960", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-27T19:35:09.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /admin/convert/export.class.php en PMB 7.4.7 y versiones anteriores permite a atacantes remotos no autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de consulta en la funci\u00f3n get_next_notice." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6356.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6356.json index 224839582ed..8d0717090c7 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6356.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6356.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6356", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-07T21:15:08.317", - "lastModified": "2024-07-08T18:15:04.350", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T19:22:33.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -72,21 +72,6 @@ } ], "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" - } - ] - } - ] - }, { "nodes": [ { @@ -243,6 +228,73 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "2A0648D7-DF8C-4127-9C1D-B3E5D492A0A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -269,23 +321,38 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2024:0881", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0897", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:1248", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:2094", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3810", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6356", @@ -303,11 +370,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240415-0002/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6536.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6536.json index 0e7208d01a9..2c073120fed 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6536.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6536.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6536", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-07T21:15:08.733", - "lastModified": "2024-07-08T18:15:04.807", - "vulnStatus": "Modified", + "lastModified": "2024-08-27T19:23:14.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,8 +80,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "2A0648D7-DF8C-4127-9C1D-B3E5D492A0A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" } ] } @@ -243,6 +280,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -269,23 +321,38 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2024:0881", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0897", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:1248", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:2094", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3810", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6536", @@ -303,11 +370,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240415-0001/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json index 4e4ed434b85..6a52101ca1c 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6866", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.847", - "lastModified": "2024-02-02T02:35:26.300", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T19:35:11.017", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json index 875ce9e59ee..a808e85fd0f 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0045", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.507", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-27T18:35:02.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En smp_proc_sec_req de smp_act.cc, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n remota (pr\u00f3xima/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7d0f696f450241d8ba7a168ba14fa7b75032f0c9", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0258.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0258.json index 1797364076b..d06fd1f8055 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0258.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0258.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0258", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.293", - "lastModified": "2024-03-13T22:15:08.970", + "lastModified": "2024-08-27T18:35:03.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en tvOS 17.4, iOS 17.4 y iPadOS 17.4, macOS Sonoma 14.4, watchOS 10.4. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario fuera de su zona de pruebas o con ciertos privilegios elevados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1544.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1544.json new file mode 100644 index 00000000000..24dc65ba18c --- /dev/null +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1544.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-1544", + "sourceIdentifier": "facts@wolfssl.com", + "published": "2024-08-27T19:15:16.547", + "lastModified": "2024-08-27T19:15:16.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Generating the ECDSA nonce k samples a random number r and then \ntruncates this randomness with a modular reduction mod n where n is the \norder of the elliptic curve. Meaning k = r mod n. The division used \nduring the reduction estimates a factor q_e by dividing the upper two \ndigits (a digit having e.g. a size of 8 byte) of r by the upper digit of \nn and then decrements q_e in a loop until it has the correct size. \nObserving the number of times q_e is decremented through a control-flow \nrevealing side-channel reveals a bias in the most significant bits of \nk. Depending on the curve this is either a negligible bias or a \nsignificant bias large enough to reconstruct k with lattice reduction \nmethods. For SECP160R1, e.g., we find a bias of 15 bits." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable", + "source": "facts@wolfssl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22939.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22939.json index bc549806bf2..04fbb6acaf5 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22939.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22939.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22939", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:07.697", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-08-27T19:35:11.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross-Site Request Forgery en FlyCms v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente system/article/category_edit." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/NUDTTAN91/CVE-2024-22939", diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json index c761232eef9..6a5d59ea275 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24279", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.673", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-08-27T18:35:04.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,46 @@ "value": "Un problema en secdiskapp 1.5.1 (programa de administraci\u00f3n para NewQ Fingerprint Encryption Super Speed Flash Disk) permite a los atacantes obtener privilegios elevados a trav\u00e9s de las funciones vsVerifyPassword y vsSetFingerPrintPower." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-261" + }, + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://github.com/BossSecuLab/Vulnerability_Reporting/security/advisories/GHSA-9fj6-vr9p-px49", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24301.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24301.json index c23cdbd07dd..4be1e532a22 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24301.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24301.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24301", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T23:15:08.190", - "lastModified": "2024-02-15T06:23:39.303", + "lastModified": "2024-08-27T19:35:12.480", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n de comandos descubierta en el dispositivo 4ipnet EAP-767 v3.42.00 dentro de la interfaz web del dispositivo permite a atacantes con credenciales v\u00e1lidas inyectar comandos de shell arbitrarios para que los ejecute el dispositivo con privilegios de root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/yckuo-sdc/PoC", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24725.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24725.json index 0c18ebf126d..d18cdd58bd0 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24725.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24725.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24725", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-23T23:15:07.193", - "lastModified": "2024-03-25T01:51:01.223", + "lastModified": "2024-08-27T18:35:04.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Gibbon hasta la versi\u00f3n 26.0.00 permite a usuarios remotos autenticados realizar ataques de deserializaci\u00f3n PHP a trav\u00e9s de columnOrder en una solicitud POST al URI module/System%20Admin/import_run.php&type=externalAssessment&step=4." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], "references": [ { "url": "https://gibbonedu.org/download/", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json index 76183f7e3c5..84b748934de 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25081.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25081", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:58.710", - "lastModified": "2024-05-01T19:15:22.183", + "lastModified": "2024-08-27T19:35:13.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Splinefont en FontForge hasta 20230101 permite la inyecci\u00f3n de comandos mediante nombres de archivos manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2", diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25469.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25469.json index 9cea344ec4f..3d882d399c4 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25469.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25469.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25469", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-23T23:15:09.740", - "lastModified": "2024-02-26T13:42:22.567", + "lastModified": "2024-08-27T19:35:14.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en CRMEB crmeb_java v.1.3.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros de latitud y longitud en el componente api/front/store/list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/crmeb/crmeb_java/", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json index e4aacc13833..c447b72727c 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25649.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25649", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T03:15:08.540", - "lastModified": "2024-03-14T12:52:09.877", + "lastModified": "2024-08-27T19:35:14.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Delinea PAM Secret Server 11.4, es posible que un atacante (con acceso de administrador a la m\u00e1quina del servidor secreto) lea los siguientes datos de un volcado de memoria: la clave maestra descifrada, las credenciales de la base de datos (cuando la autenticaci\u00f3n de SQL Server est\u00e1 habilitada), el clave de cifrado de mensajes de cola de RabbitMQ y cookies de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-316" + } + ] + } + ], "references": [ { "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25649", diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25751.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25751.json index c2a17e8d957..a4c00d6eca3 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25751.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25751.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25751", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T22:15:07.053", - "lastModified": "2024-02-27T14:20:06.637", + "lastModified": "2024-08-27T19:35:15.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en Tenda AC9 v.3.0 con versi\u00f3n de firmware v.15.03.06.42_multi permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n fromSetSysTime." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetSysTime.md", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json index c5dde05f347..0f98c42ab8b 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25854.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25854", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-11T22:15:55.210", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-08-27T19:35:16.580", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting (XSS) en Sourcecodester Insurance Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos Asunto y Descripci\u00f3n al enviar un ticket de soporte." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/hakkitoklu/hunt/blob/main/Insurance%20Management%20System%20PHP%20and%20MySQL%201.0/xss.md", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25874.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25874.json index 1bac49fa44a..1d3763e5a70 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25874.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25874.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25874", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T14:15:46.947", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-27T19:35:17.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en el m\u00f3dulo Nuevo/Editar art\u00edculo de Enhavo CMS v0.13.1 permite a los atacantes ejecutar scrips web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto Crear etiqueta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/dd3x3r/enhavo/blob/main/xss-create-tag-v0.13.1.md", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json index 05f383d977b..3b959ce8567 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26540.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26540", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T01:15:58.833", - "lastModified": "2024-03-15T12:53:06.423", + "lastModified": "2024-08-27T18:35:05.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se puede producir un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en Clmg anterior a 3.3.3 a trav\u00e9s de un archivo manipulado en cimg_library::CImg::_load_analyze." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/GreycLab/CImg/issues/403", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27283.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27283.json index 17982619077..55a7d5f67bc 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27283.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27283.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27283", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T05:15:10.087", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-27T19:35:18.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://www.veritas.com/support/en_US/security/VTS23-020", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json index 5e1c8455b99..b7dc933aff4 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27703.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27703", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T22:15:11.843", - "lastModified": "2024-03-14T12:52:16.723", + "lastModified": "2024-08-27T19:35:18.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en Leantime 3.0.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de t\u00edtulo de tareas pendientes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27703/README.md", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27719.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27719.json index 9ba6f593f91..c7a5eec91cb 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27719.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27719.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27719", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T19:15:48.570", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-08-27T19:35:19.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en rems FAQ Management System v.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en el campo Preguntas frecuentes en la funci\u00f3n Agregar preguntas frecuentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.sourcecodester.com/php/17175/faq-management-system-using-php-and-mysql-source-code.html", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json index 1bbe2ed2045..5bec9d6b902 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29269", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T20:15:07.440", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-27T18:35:06.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en Telesquare TLR-2005Ksh 1.0.0 y 1.1.4 permite a los atacantes ejecutar comandos arbitrarios del sistema a trav\u00e9s del par\u00e1metro Cmd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/wutalent/CVE-2024-29269/blob/main/index.md", diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29640.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29640.json index 938dd3d2148..c505124e641 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29640.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29640.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29640", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T17:15:12.380", - "lastModified": "2024-04-01T01:12:59.077", + "lastModified": "2024-08-27T18:35:07.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en aliyundrive-webdav v.2.3.3 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el par\u00e1metro sid en el componente action_query_qrcode." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://aliyundrive-webdav.com", diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29666.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29666.json index 2649fd9c94d..1f4b5f24b5e 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29666.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29666.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29666", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T19:15:59.253", - "lastModified": "2024-03-26T12:55:05.010", + "lastModified": "2024-08-27T18:35:08.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de permisos inseguros en el sistema de plataforma de monitoreo de veh\u00edculos CMSV6 v.7.31.0.2 a v.7.32.0.3 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente de contrase\u00f1a predeterminado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1393" + } + ] + } + ], "references": [ { "url": "https://github.com/whgojp/cve-reports/wiki/There-is-a-weak-password-in-the-CMSV6-vehicle-monitoring-platform-system", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json index 57fdd7800d6..e2b46d926f3 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29944.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29944", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-22T13:15:07.503", - "lastModified": "2024-05-01T18:15:18.987", + "lastModified": "2024-08-27T18:35:09.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un atacante pudo inyectar un controlador de eventos en un objeto privilegiado que permitir\u00eda la ejecuci\u00f3n arbitraria de JavaScript en el proceso principal. Nota: Esta vulnerabilidad afecta \u00fanicamente a Firefox de escritorio, no afecta a las versiones m\u00f3viles de Firefox. Esta vulnerabilidad afecta a Firefox < 124.0.1 y Firefox ESR < 115.9.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/23/1", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json index 78be871dff7..b35df1b88f7 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30600.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30600", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T15:15:46.603", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-27T19:35:20.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro schedEndTime de la funci\u00f3n setSchedWifi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json index 41d74768117..e4bfc171097 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30606.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30606", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T14:15:15.480", - "lastModified": "2024-03-28T16:07:30.893", + "lastModified": "2024-08-27T19:35:21.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1203 v2.0.1.6 tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromDhcpListClient." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_page.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30626.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30626.json index c3b559b2cb6..8ff27ba1983 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30626.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30626.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30626", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.090", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-27T19:35:24.760", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro schedEndTime de la funci\u00f3n setSchedWifi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_end.md", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30630.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30630.json index 729637c6169..06d5bed6999 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30630.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30630.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30630", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T13:15:16.273", - "lastModified": "2024-03-29T13:28:22.880", + "lastModified": "2024-08-27T19:35:25.577", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de tiempo de la funci\u00f3n saveParentControlInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_time.md", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3088.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3088.json index b6bc202810b..e58aaad3640 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3088.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3088.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3088", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-30T11:15:50.483", - "lastModified": "2024-05-17T02:39:42.873", + "lastModified": "2024-08-27T18:35:09.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31033.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31033.json index 3c510bb45dd..36cd775c3eb 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31033.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31033.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31033", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T02:15:07.850", - "lastModified": "2024-08-02T02:15:31.420", + "lastModified": "2024-08-27T18:35:09.280", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,30 @@ "value": "JJWT (tambi\u00e9n conocido como Java JWT) hasta 0.12.5 ignora ciertos caracteres y, por lo tanto, un usuario podr\u00eda concluir err\u00f3neamente que tiene una clave segura. El c\u00f3digo afectado es el m\u00e9todo setSigningKey() dentro de la clase DefaultJwtParser y el m\u00e9todo signWith() dentro de la clase DefaultJwtBuilder." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://github.com/2308652512/JJWT_BUG", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31498.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31498.json index ab9fdfe7e03..9dfb61c90d0 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31498.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31498.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31498", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T23:15:16.743", - "lastModified": "2024-04-08T00:15:08.000", + "lastModified": "2024-08-27T19:35:26.363", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ykman-gui (tambi\u00e9n conocido como GUI de YubiKey Manager) anterior a 1.2.6 en Windows, cuando no se usa Edge, permite la escalada de privilegios porque las ventanas del navegador se pueden abrir como Administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://www.yubico.com/support/security-advisories/ysa-2024-01/", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36068.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36068.json new file mode 100644 index 00000000000..a9d524445b4 --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36068.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36068", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T18:15:14.427", + "lastModified": "2024-08-27T19:35:27.183", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An incorrect access control vulnerability in Rubrik CDM versions prior to 9.1.2-p1, 9.0.3-p6 and 8.1.3-p12, allows an attacker with network access to execute arbitrary code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.rubrik.com/advisories/rbk-20240619-v0044", + "source": "cve@mitre.org" + }, + { + "url": "https://www.rubrik.com/products/cloud-data-management", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38547.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38547.json index 0e250f7c739..759091a237a 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38547.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38547", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:14.973", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:56:36.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: media: atomisp: ssh_css: corrige una desreferencia de puntero nulo en load_video_binaries La falla de asignaci\u00f3n de mycs->yuv_scaler_binary en load_video_binaries() va seguida de una desreferencia de mycs->yuv_scaler_binary despu\u00e9s de siguiente cadena de llamadas: sh_css_pipe_load_binaries() |-> load_video_binaries(mycs->yuv_scaler_binary == NULL) | |-> sh_css_pipe_unload_binaries() |-> unload_video_binaries() En unload_video_binaries(), llama a ia_css_binary_unload con el argumento &pipe->pipe_settings.video.yuv_scaler_binary[i], que se refiere a la misma ranura de memoria que mycs->yuv_scaler_binary. Por lo tanto, se activa una desreferencia de puntero nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "58594503-2699-4CEB-8D05-6DFB3484E37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3b621e9e9e148c0928ab109ac3d4b81487469acb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b68b861b514a5c09220d622ac3784c0ebac6c80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6482c433863b257b0b9b687c28ce80b89d5f89f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69b27ff82f87379afeaaea4b2f339032fdd8486e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82c2c85aead3ea3cbceef4be077cf459c5df2272", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1ab99dcc8604afe7e3bccb01b10da03bdd7ea35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc20c87b04db86c8e3e810bcdca686b406206069", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json index ee27ef6314b..9b10dea9df7 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38549", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.163", - "lastModified": "2024-07-15T07:15:08.820", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:57:48.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/mediatek: Agregar verificaci\u00f3n de tama\u00f1o 0 a mtk_drm_gem_obj Agregar una verificaci\u00f3n a mtk_drm_gem_init si intentamos asignar un objeto GEM de 0 bytes. Actualmente, no existe tal verificaci\u00f3n y el kernel entrar\u00e1 en p\u00e1nico si una aplicaci\u00f3n de espacio de usuario intenta asignar un b\u00fafer GBM 0x0. Probado intentando asignar un b\u00fafer GBM 0x0 en un MT8188 y verificando que ahora devolvemos EINVAL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "594BEF43-C2C9-4680-A8DA-DAE0487DAEB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e3b6f9123726858cac299e1654e3d20424cabe4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13562c2d48c9ee330de1077d00146742be368f05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e4350095e8ab2577ee05f8c3b044e661b5af9a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79078880795478d551a05acc41f957700030d364", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9489951e3ae505534c4013db4e76b1b5a3151ac7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af26ea99019caee1500bf7e60c861136c0bf8594", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be34a1b351ea7faeb15dde8c44fe89de3980ae67", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d17b75ee9c2e44d3a3682c4ea5ab713ea6073350", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb4aabdb1b48c25d9e1ee28f89440fd2ce556405", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38551.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38551.json index 8bead8aba08..eaf5b11bbd2 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38551.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38551", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.357", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:54:39.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: mediatek: Asignar dummy cuando el c\u00f3dec no est\u00e1 especificado para un enlace DAI Los controladores de la tarjeta de sonido MediaTek est\u00e1n comprobando si hay un enlace DAI presente y utilizado en una placa para asignar los par\u00e1metros correctos y esto se realiza comprobando los nombres DAI del c\u00f3dec en el momento de la sonda. Si no hay ning\u00fan c\u00f3dec real, asigne el c\u00f3dec ficticio al enlace DAI para evitar el puntero NULL durante la comparaci\u00f3n de cadenas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "23CACAE0-7893-46F0-8796-BB256AF77F59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0c052b1c11d8119f3048b1f7b3c39a90500cacf9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f39231888c63f0a7708abc86b51b847476379d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87b8dca6e06f9b1681bc52bf7bfa85c663a11158", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cbbcabc7f0979f6542372cf88d7a9da7143a4226", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json index 4eeb10d5b4b..925886f467e 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38552", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.450", - "lastModified": "2024-07-15T07:15:09.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:55:05.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: corrige un posible \u00edndice fuera de los l\u00edmites en la funci\u00f3n de transformaci\u00f3n de color. Corrige el problema de \u00edndice fuera de los l\u00edmites en la funci\u00f3n de transformaci\u00f3n de color. El problema podr\u00eda ocurrir cuando el \u00edndice 'i' excede la cantidad de puntos de funci\u00f3n de transferencia (TRANSFER_FUNC_POINTS). La soluci\u00f3n agrega una verificaci\u00f3n para garantizar que 'i' est\u00e9 dentro de los l\u00edmites antes de acceder a los puntos de funci\u00f3n de transferencia. Si 'i' est\u00e1 fuera de los l\u00edmites, se registra un mensaje de error y la funci\u00f3n devuelve falso para indicar un error. Reportado por smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: desbordamiento del b\u00fafer 'output_tf->tf_pts.red' 1025 <= controladores s32max/gpu /drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: desbordamiento del b\u00fafer 'output_tf->tf_pts.green' 1025 <= controladores s32max/gpu/drm/amd/amdgpu/ ../display/dc/dcn10/dcn10_cm_common.c:407 error de cm_helper_translate_curve_to_hw_format(): desbordamiento del b\u00fafer 'output_tf->tf_pts.blue' 1025 <= s32max" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.16", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "ED5E0A5E-EF43-449A-90CC-20F2A9F6DBB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/04bc4d1090c343025d69149ca669a27c5b9c34a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/123edbae64f4d21984359b99c6e79fcde31c6123", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e8c8b37ee84b3b19c448d2b8e4c916d2f5b9c86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/604c506ca43fce52bb882cff9c1fdf2ec3b4029c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63ae548f1054a0b71678d0349c7dc9628ddd42ca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7226ddf3311c5e5a7726ad7d4e7b079bb3cfbb29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98b8a6bfd30d07a19cfacdf82b50f84bf3360869", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ced9c4e2289a786b8fa684d8893b7045ea53ef7e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e280ab978c81443103d7c61bdd1d8d708cf6ed6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38553.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38553.json index 6f1b506297d..3b370b1e173 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38553.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38553", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.550", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:45:18.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fec: elimine .ndo_poll_controller para evitar interbloqueos. Se encontr\u00f3 un problema de interbloqueo en el controlador sungem; consulte el commit ac0a230f719b (\"eth: sungem: elimine .ndo_poll_controller para evitar interbloqueos \"). La causa principal del problema es que netpoll est\u00e1 en un contexto at\u00f3mico y la interfaz .ndo_poll_controller del controlador sungem llama a enable_irq(); sin embargo, enable_irq() puede estar inactivo. Despu\u00e9s de analizar la implementaci\u00f3n de fec_poll_controller(), el controlador fec deber\u00eda tener el mismo problema. Debido a que el controlador fec utiliza NAPI para las completaciones de TX, no es necesario implementar .ndo_poll_controller en el controlador fec, por lo que fec_poll_controller() se puede eliminar de forma segura." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "76121B3C-353D-4A1E-BC1A-F1E22509281C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38554.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38554.json index 378e8f86b8e..da6f9998307 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38554.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38554.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38554", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.627", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:55:32.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ax25: Solucionar el problema de fuga del recuento de referencias de net_device Hay un problema de fuga del recuento de referencias del objeto \"net_device\" en ax25_dev_device_down(). Cuando el dispositivo ax25 se est\u00e1 apagando, ax25_dev_device_down() elimina el recuento de referencia de net_device una o cero veces dependiendo de si vamos a unlock_put o no, lo que provocar\u00e1 una p\u00e9rdida de memoria. Para resolver el problema anterior, reduzca el recuento de referencias de net_device despu\u00e9s de que dev->ax25_ptr se establezca en nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "899D7A4F-A23D-4FA2-84B4-4BAA03F98BBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/36e56b1b002bb26440403053f19f9e1a8bc075b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ec437f9bbae68e9b38115c4c91de995f73f6bad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8bad3a20a27be8d935f2aae08d3c6e743754944a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/965d940fb7414b310a22666503d2af69459c981b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eef95df9b752699bddecefa851f64858247246e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38555.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38555.json index 2ac142180b5..60afc149a37 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38555.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38555", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.720", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T19:54:04.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: descartar la finalizaci\u00f3n de comandos en caso de error interno. Se corrige el use-after-free cuando llega la finalizaci\u00f3n del FW mientras el dispositivo est\u00e1 en estado de error interno. Evite llamar al controlador de finalizaci\u00f3n en este caso, ya que el dispositivo limpiar\u00e1 la interfaz de comando y activar\u00e1 todas las finalizaciones manualmente. Registro del kernel: ------------[ cortar aqu\u00ed ]------------ refcount_t: underflow; use-after-free. ... RIP: 0010:refcount_warn_saturate+0xd8/0xe0 ... Seguimiento de llamadas: ? __advertir+0x79/0x120 ? refcount_warn_saturate+0xd8/0xe0? report_bug+0x17c/0x190? handle_bug+0x3c/0x60? exc_invalid_op+0x14/0x70? asm_exc_invalid_op+0x16/0x20? refcount_warn_saturate+0xd8/0xe0 cmd_ent_put+0x13b/0x160 [mlx5_core] mlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core] cmd_comp_notifier+0x1f/0x30 [mlx5_core] notifier_call_chain+0x35/0xb0 cadena+0x16/0x20 mlx5_eq_async_int+0xf6/0x290 [mlx5_core] notifier_call_chain+0x35 /0xb0 atomic_notifier_call_chain+0x16/0x20 irq_int_handler+0x19/0x30 [mlx5_core] __handle_irq_event_percpu+0x4b/0x160 handle_irq_event+0x2e/0x80 handle_edge_irq+0x98/0x230 __common_interrupt+0x3b/0 xa0 interrupci\u00f3n_com\u00fan+0x7b/0xa0 asm_interrupci\u00f3n_com\u00fan+0x22 /0x40" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.20", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "12848580-6A3F-4069-9B0A-78AAA5E79BE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "A5A5A54E-7208-43CC-811F-57A4B7A4488D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38591.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38591.json index 41c675fc410..542b37f847d 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38591.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38591", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.207", - "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T18:36:09.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/hns: corrige el punto muerto en eventos as\u00edncronos de SRQ. Es posible que se requiera xa_lock para la tabla SRQ en AEQ. Utilice xa_store_irq()/ xa_erase_irq() para evitar un punto muerto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "B75AC234-BEB3-4166-A71B-A8017869419D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22c915af31bd84ffaa46145e317f53333f94a868", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a3be1a0ffe04c085dd7f79be97c91b0c786df3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72dc542f0d8977e7d41d610db6bb65c47cad43e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/756ddbe665ea7f9416951bd76731b174d136eea0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b46494b6f9c19f141114a57729e198698f40af37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d271e66abac5c7eb8de345b9b44d89f777437a4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38597.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38597.json index ec3ee3b90bb..d7b6c45b415 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38597.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38597", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.730", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T18:36:47.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: sungem: elimine .ndo_poll_controller para evitar interbloqueos Erhard informa advertencias de netpoll desde sungem: netpoll_send_skb_on_dev(): eth0 habilit\u00f3 interrupciones en la encuesta (gem_start_xmit+0x0/0x398) ADVERTENCIA: CPU: 1 PID: 1 en net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c gem_poll_controller() desactiva las interrupciones, que pueden dormir. No podemos dormir en netpoll, tiene las interrupciones desactivadas por completo. Curiosamente, gem_poll_controller() ni siquiera sondea las finalizaciones y, en cambio, act\u00faa como si se hubiera disparado una interrupci\u00f3n, por lo que simplemente programa NAPI y sale. Nada de esto ha sido necesario durante a\u00f1os, ya que netpoll invoca directamente a NAPI." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "2A2D510F-E44F-46B1-ADAE-F009C5BA4620" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/476adb3bbbd7886e8251d3b9ce2d3c3e680f35d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5de5aeb98f9a000adb0db184e32765e4815d860b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6400d205fbbcbcf9b8510157e1f379c1d7e2e937", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac0a230f719b02432d8c7eba7615ebd691da86f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e22b23f5888a065d084e87db1eec639c445e677f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/faf94f1eb8a34b2c31b2042051ef36f63420ecce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fbeeb55dbb33d562149c57e794f06b7414e44289", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json index d20e5e8d4cb..9317921bbe4 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38598", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.813", - "lastModified": "2024-07-15T07:15:11.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T18:36:57.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: md: corrige el bloqueo suave de resincronizaci\u00f3n cuando el tama\u00f1o del mapa de bits es menor que el tama\u00f1o de la matriz. Se informa que para dm-raid10, lvextend + lvchange --syncaction activar\u00e1 el siguiente bloqueo suave: kernel:watchdog: ERROR : bloqueo suave - \u00a1CPU n.\u00b0 3 bloqueada durante 26 segundos! [mdX_resync:6976] CPU: 7 PID: 3588 Comm: mdX_resync Kdump: cargado No contaminado 6.9.0-rc4-next-20240419 #1 RIP: 0010:_raw_spin_unlock_irq+0x13/0x30 Seguimiento de llamadas: md_bitmap_start_sync+0x6b/0xf0 raid10_sync_request+0x25c/0x1b40 [raid10] md_do_sync+0x64b/0x1020 md_thread+0xa7/0x170 kthread+0xcf/0x100 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1a/0x30 Y el proceso detallado es el siguiente: _sync j = mddev->resync_min mientras ( j < max_sectors) sectores = raid10_sync_request(mddev, j, &skipped) if (!md_bitmap_start_sync(..., &sync_blocks)) // md_bitmap_start_sync establece sync_blocks en 0 return sync_blocks + sectores_skippe; // sectores = 0; j += sectores; // j nunca cambia La causa principal es que el commit 301867b1c168 (\"md/raid10: check slab-out-of-bounds in md_bitmap_get_counter\") regresa antes de md_bitmap_get_counter(), sin configurar los bloques devueltos. Solucione este problema estableciendo siempre los bloques devueltos desde md_bitmap_get_counter\"(), como sol\u00eda ser. Tenga en cuenta que este parche solo soluciona el problema de bloqueo suave en el kernel, el caso de que el tama\u00f1o del mapa de bits no coincida con el tama\u00f1o de la matriz a\u00fan debe solucionarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.291", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "D449D4CF-AE68-4FE1-98DD-482B945BAA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.251", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "49B564BA-8384-473B-BC05-994F72E04C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.188", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "2EFD3D32-B50C-4E8A-9442-0D20D3D943F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.121", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "45789776-D688-4A53-B8C0-06A0C8BAE3C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.39", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "AEE63F27-E37D-4277-A5F3-9376E04C3BE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "3781A223-DB26-4813-92E3-3EF7B545A0E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43771597feba89a839c5f893716df88ae5c237ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5817f43ae1a118855676f57ef7ab50e37eac7482", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69296914bfd508c85935bf5f711cad9b0fe78492", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c9566b812c8f66160466cc1e29df6d3646add0b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json index 20b2c2bf80e..ce92ea86644 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39248", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T17:15:04.303", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T18:32:45.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,76 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en SimpCMS v0.1 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado en el campo T\u00edtulo en /admin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fikeulous:simpcms:0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "ED754D76-46F5-461B-BB33-670360924708" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jasonthename/CVE-2024-39248", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://packetstormsecurity.com/files/179219", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json index f137db3f452..5cab30fb212 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39427", "sourceIdentifier": "security@unisoc.com", "published": "2024-07-01T09:15:06.493", - "lastModified": "2024-08-27T17:33:15.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T18:32:28.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,8 +81,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:sc7731e_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "52A02668-6A09-4D48-B224-4700F3BC7538" + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" } ] }, @@ -90,303 +100,66 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:sc9832e_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D10E2ED6-0B1A-41AF-BE6B-E32BF5DF529B" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:sc9863a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6110F3F3-713E-4DC2-A70A-E13C5C315685" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t310_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4FB62FC4-66EB-4E4C-AD88-4E9205411D38" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t606_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2F005C8C-3515-48F6-AD73-8CD5DFC351FB" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t612_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CF7DAD66-AFC2-434E-B7E8-2C92E3F8564F" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t616_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D1C094C1-8EEB-4777-95B8-2FB802A2D74E" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t610_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "387350DE-965C-4FA7-9DC5-ABEEE94C39A0" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t618_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1F184416-73D8-4790-8D15-11C5D3D440DE" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t760_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "280225F7-554C-43BA-8D7F-9C250CEEAEBE" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t770_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8550BDEB-442B-4D22-8BCE-53CE81F85ABF" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:t820_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "695395BB-E6BC-4B2D-9CE4-015CCF5E81CF" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": false, "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", @@ -395,33 +168,6 @@ ] } ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:unisoc:s8000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B28EDE1D-4737-4703-9896-1B6AC6D3BA2A" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" - } - ] - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json index f107b0ff157..188ff4348b9 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40395", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T16:15:07.583", - "lastModified": "2024-08-27T16:15:07.583", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json index 88a9bee892b..af8636324f8 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41622", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T16:15:07.673", - "lastModified": "2024-08-27T16:15:07.673", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:35:10.613", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json new file mode 100644 index 00000000000..2947888244f --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42851.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42851", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T18:15:14.993", + "lastModified": "2024-08-27T19:35:28.000", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/T1anyang/fuzzing/blob/main/exiftags/crash.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43414.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43414.json new file mode 100644 index 00000000000..953ca1be53c --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43414.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-43414", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-27T18:15:15.083", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Each team can own their slice of the graph independently, empowering them to deliver autonomously and incrementally. Instances of @apollo/query-planner >=2.0.0 and <2.8.5 are impacted by a denial-of-service vulnerability. @apollo/gateway versions >=2.0.0 and < 2.8.5 and Apollo Router <1.52.1 are also impacted through their use of @apollo/query-panner. If @apollo/query-planner is asked to plan a sufficiently complex query, it may loop infinitely and never complete. This results in unbounded memory consumption and either a crash or out-of-memory (OOM) termination. This issue can be triggered if you have at least one non-@key field that can be resolved by multiple subgraphs. To identify these shared fields, the schema for each subgraph must be reviewed. The mechanism to identify shared fields varies based on the version of Federation your subgraphs are using. You can check if your subgraphs are using Federation 1 or Federation 2 by reviewing their schemas. Federation 2 subgraph schemas will contain a @link directive referencing the version of Federation being used while Federation 1 subgraphs will not. For example, in a Federation 2 subgraph, you will find a line like @link(url: \"https://specs.apollo.dev/federation/v2.0\"). If a similar @link directive is not present in your subgraph schema, it is using Federation 1. Note that a supergraph can contain a mix of Federation 1 and Federation 2 subgraphs. This issue results from the Apollo query planner attempting to use a Number exceeding Javascript\u2019s Number.MAX_VALUE in some cases. In Javascript, Number.MAX_VALUE is (2^1024 - 2^971). When the query planner receives an inbound graphql request, it breaks the query into pieces and for each piece, generates a list of potential execution steps to solve the piece. These candidates represent the steps that the query planner will take to satisfy the pieces of the larger query. As part of normal operations, the query planner requires and calculates the number of possible query plans for the total query. That is, it needs the product of the number of query plan candidates for each piece of the query. Under normal circumstances, after generating all query plan candidates and calculating the number of all permutations, the query planner moves on to stack rank candidates and prune less-than-optimal options. In particularly complex queries, especially those where fields can be solved through multiple subgraphs, this can cause the number of all query plan permutations to balloon. In worst-case scenarios, this can end up being a number larger than Number.MAX_VALUE. In Javascript, if Number.MAX_VALUE is exceeded, Javascript represents the value as \u201cinfinity\u201d. If the count of candidates is evaluated as infinity, the component of the query planner responsible for pruning less-than-optimal query plans does not actually prune candidates, causing the query planner to evaluate many orders of magnitude more query plan candidates than necessary. This issue has been addressed in @apollo/query-planner v2.8.5, @apollo/gateway v2.8.5, and Apollo Router v1.52.1. Users are advised to upgrade. This issue can be avoided by ensuring there are no fields resolvable from multiple subgraphs. If all subgraphs are using Federation 2, you can confirm that you are not impacted by ensuring that none of your subgraph schemas use the @shareable directive. If you are using Federation 1 subgraphs, you will need to validate that there are no fields resolvable by multiple subgraphs." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apollographql/federation/security/advisories/GHSA-fmj9-77q8-g6c4", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.apollographql.com/docs/federation/query-plans", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.apollographql.com/docs/router/configuration/persisted-queries", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43783.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43783.json new file mode 100644 index 00000000000..c54bf8f3234 --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43783.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-43783", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-27T18:15:15.403", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Instances of the Apollo Router running versions >=1.21.0 and < 1.52.1 are impacted by a denial of service vulnerability if _all_ of the following are true: 1. The Apollo Router has been configured to support [External Coprocessing](https://www.apollographql.com/docs/router/customizations/coprocessor). 2. The Apollo Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators. Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if all of the following are true: 1. Router has been configured to use a custom-developed Native Rust Plugin. 2. The plugin accesses Request.router_request in the RouterService layer. 3. You are accumulating the body from Request.router_request into memory. If using an impacted configuration, the Router will load entire HTTP request bodies into memory without respect to other HTTP request size-limiting configurations like limits.http_max_request_bytes. This can cause the Router to be out-of-memory (OOM) terminated if a sufficiently large request is sent to the Router. By default, the Router sets limits.http_max_request_bytes to 2 MB. If you have an impacted configuration as defined above, please upgrade to at least Apollo Router 1.52.1. If you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the coprocessor.router.request.body configuration option to false. Please note that changing this configuration option will change the information sent to any coprocessors you have configured and may impact functionality implemented by those coprocessors. If you have developed a Native Rust Plugin and cannot upgrade, you can update your plugin to either not accumulate the request body or enforce a maximum body size limit. You can also mitigate this issue by limiting HTTP body payload sizes prior to the Router (e.g., in a proxy or web application firewall appliance)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apollographql/router/commit/7a9c020608a62dcaa306b72ed0f6980f15923b14", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/apollographql/router/releases/tag/v1.52.1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/apollographql/router/security/advisories/GHSA-x6xq-whh3-gg32", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.apollographql.com/docs/router/configuration/overview/#request-limits", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.apollographql.com/docs/router/customizations/coprocessor", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.apollographql.com/docs/router/customizations/native", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json index a0badeb9518..8cae66982b4 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43788", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-27T17:15:07.967", - "lastModified": "2024-08-27T17:15:07.967", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json index 639a29a3f67..def17766c76 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44340", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T16:15:07.760", - "lastModified": "2024-08-27T16:15:07.760", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:35:11.777", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json index 39ff3dc9599..f9f685479d2 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44341", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T16:15:07.860", - "lastModified": "2024-08-27T16:15:07.860", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:35:12.540", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json index 3f29317b23d..7dcd2ddec19 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44342", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T16:15:07.993", - "lastModified": "2024-08-27T16:15:07.993", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:35:13.327", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter. This vulnerability is exploited via a crafted POST request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45037.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45037.json new file mode 100644 index 00000000000..9d6284016d1 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45037.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-45037", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-27T19:15:17.583", + "lastModified": "2024-08-27T19:15:17.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer\u2019s AWS account. CDK contains pre-built components called \"constructs\" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates. We identified an issue in AWS Cloud Development Kit (CDK) which, under certain conditions, can result in granting authenticated Amazon Cognito users broader than intended access. Specifically, if a CDK application uses the \"RestApi\" construct with \"CognitoUserPoolAuthorizer\" as the authorizer and uses authorization scopes to limit access. This issue does not affect the availability of the specific API resources. Authenticated Cognito users may gain unintended access to protected API resources or methods, leading to potential data disclosure, and modification issues. Impacted versions: >=2.142.0;<=2.148.0. A patch is included in CDK versions >=2.148.1. Users are advised to upgrade their AWS CDK version to 2.148.1 or newer and re-deploy their application(s) to address this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://docs.aws.amazon.com/cdk/v2/guide/home.html", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/aws-cdk/commit/4bee768f07e73ab5fe466f9ad3d1845456a0513b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/aws-cdk/releases/tag/v2.148.1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/aws-cdk/security/advisories/GHSA-qj85-69xf-2vxq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json index 366adc2a35f..894203f4395 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45264", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T16:15:08.070", - "lastModified": "2024-08-27T17:35:08.307", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json new file mode 100644 index 00000000000..150d30ce9d4 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5288", + "sourceIdentifier": "facts@wolfssl.com", + "published": "2024-08-27T19:15:17.797", + "lastModified": "2024-08-27T19:15:17.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys,\n\nsuch as in server-side TLS connections, the connection is halted if any fault occurs.\u00a0The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable", + "source": "facts@wolfssl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json new file mode 100644 index 00000000000..9f26f8c4cd8 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5814.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-5814", + "sourceIdentifier": "facts@wolfssl.com", + "published": "2024-08-27T19:15:17.980", + "lastModified": "2024-08-27T19:15:17.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:D/RE:M/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "NOT_DEFINED", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "references": [ + { + "url": "https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later", + "source": "facts@wolfssl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json new file mode 100644 index 00000000000..30a9c0c84d9 --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-5991", + "sourceIdentifier": "facts@wolfssl.com", + "published": "2024-08-27T19:15:18.080", + "lastModified": "2024-08-27T19:15:18.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "facts@wolfssl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://https://github.com/wolfSSL/wolfssl/pull/7604", + "source": "facts@wolfssl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json new file mode 100644 index 00000000000..a54a7d43d81 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-7720", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-08-27T18:15:15.840", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8033.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8033.json index eb5b2efdf4c..4f31b06964b 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8033.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8033.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8033", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.897", - "lastModified": "2024-08-22T17:36:07.673", + "lastModified": "2024-08-27T19:39:04.953", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -57,7 +57,15 @@ "nodes": [ { "operator": "OR", - "negate": false + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0.6613.84", + "matchCriteriaId": "DAE0C7AB-1D61-4449-BC82-915B019F311F" + } + ] }, { "operator": "OR", diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json index edefe52ee54..a14bcd84bdc 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8199", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-27T16:15:08.173", - "lastModified": "2024-08-27T16:15:08.173", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json index 79b97b2426d..bc0d5f0f263 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8200", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-27T16:15:08.383", - "lastModified": "2024-08-27T16:15:08.383", - "vulnStatus": "Received", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json new file mode 100644 index 00000000000..ce305c51776 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8208.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-8208", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T18:15:15.950", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file editClient.php. The manipulation of the argument AGENT ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.275917", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275917", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.393511", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json new file mode 100644 index 00000000000..9d6d98b8ef9 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8209.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-8209", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T18:15:16.617", + "lastModified": "2024-08-27T18:33:14.247", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.275918", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275918", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.393512", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json new file mode 100644 index 00000000000..4eb2677b882 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8210.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-8210", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T19:15:18.250", + "lastModified": "2024-08-27T19:15:18.250", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_mount leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_3rd_DiskMGR.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275919", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275919", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.397274", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8211.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8211.json new file mode 100644 index 00000000000..9b4a2bf4940 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8211.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-8211", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-27T19:15:18.553", + "lastModified": "2024-08-27T19:15:18.553", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_Std2R1_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_newly_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R1_DiskMGR.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.275920", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.275920", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.397275", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 656ed6264b8..066345077fa 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-27T18:00:17.823769+00:00 +2024-08-27T20:00:17.835238+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-27T17:56:02.507000+00:00 +2024-08-27T19:57:48.560000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261303 +261319 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` - -- [CVE-2024-40395](CVE-2024/CVE-2024-403xx/CVE-2024-40395.json) (`2024-08-27T16:15:07.583`) -- [CVE-2024-41622](CVE-2024/CVE-2024-416xx/CVE-2024-41622.json) (`2024-08-27T16:15:07.673`) -- [CVE-2024-43788](CVE-2024/CVE-2024-437xx/CVE-2024-43788.json) (`2024-08-27T17:15:07.967`) -- [CVE-2024-44340](CVE-2024/CVE-2024-443xx/CVE-2024-44340.json) (`2024-08-27T16:15:07.760`) -- [CVE-2024-44341](CVE-2024/CVE-2024-443xx/CVE-2024-44341.json) (`2024-08-27T16:15:07.860`) -- [CVE-2024-44342](CVE-2024/CVE-2024-443xx/CVE-2024-44342.json) (`2024-08-27T16:15:07.993`) -- [CVE-2024-45264](CVE-2024/CVE-2024-452xx/CVE-2024-45264.json) (`2024-08-27T16:15:08.070`) -- [CVE-2024-8199](CVE-2024/CVE-2024-81xx/CVE-2024-8199.json) (`2024-08-27T16:15:08.173`) -- [CVE-2024-8200](CVE-2024/CVE-2024-82xx/CVE-2024-8200.json) (`2024-08-27T16:15:08.383`) +Recently added CVEs: `16` + +- [CVE-2022-39996](CVE-2022/CVE-2022-399xx/CVE-2022-39996.json) (`2024-08-27T18:15:13.197`) +- [CVE-2022-39997](CVE-2022/CVE-2022-399xx/CVE-2022-39997.json) (`2024-08-27T19:15:15.953`) +- [CVE-2024-1544](CVE-2024/CVE-2024-15xx/CVE-2024-1544.json) (`2024-08-27T19:15:16.547`) +- [CVE-2024-36068](CVE-2024/CVE-2024-360xx/CVE-2024-36068.json) (`2024-08-27T18:15:14.427`) +- [CVE-2024-42851](CVE-2024/CVE-2024-428xx/CVE-2024-42851.json) (`2024-08-27T18:15:14.993`) +- [CVE-2024-43414](CVE-2024/CVE-2024-434xx/CVE-2024-43414.json) (`2024-08-27T18:15:15.083`) +- [CVE-2024-43783](CVE-2024/CVE-2024-437xx/CVE-2024-43783.json) (`2024-08-27T18:15:15.403`) +- [CVE-2024-45037](CVE-2024/CVE-2024-450xx/CVE-2024-45037.json) (`2024-08-27T19:15:17.583`) +- [CVE-2024-5288](CVE-2024/CVE-2024-52xx/CVE-2024-5288.json) (`2024-08-27T19:15:17.797`) +- [CVE-2024-5814](CVE-2024/CVE-2024-58xx/CVE-2024-5814.json) (`2024-08-27T19:15:17.980`) +- [CVE-2024-5991](CVE-2024/CVE-2024-59xx/CVE-2024-5991.json) (`2024-08-27T19:15:18.080`) +- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-08-27T18:15:15.840`) +- [CVE-2024-8208](CVE-2024/CVE-2024-82xx/CVE-2024-8208.json) (`2024-08-27T18:15:15.950`) +- [CVE-2024-8209](CVE-2024/CVE-2024-82xx/CVE-2024-8209.json) (`2024-08-27T18:15:16.617`) +- [CVE-2024-8210](CVE-2024/CVE-2024-82xx/CVE-2024-8210.json) (`2024-08-27T19:15:18.250`) +- [CVE-2024-8211](CVE-2024/CVE-2024-82xx/CVE-2024-8211.json) (`2024-08-27T19:15:18.553`) ### CVEs modified in the last Commit -Recently modified CVEs: `81` - -- [CVE-2024-38602](CVE-2024/CVE-2024-386xx/CVE-2024-38602.json) (`2024-08-27T16:01:39.983`) -- [CVE-2024-39097](CVE-2024/CVE-2024-390xx/CVE-2024-39097.json) (`2024-08-27T16:35:13.930`) -- [CVE-2024-39427](CVE-2024/CVE-2024-394xx/CVE-2024-39427.json) (`2024-08-27T17:33:15.990`) -- [CVE-2024-39428](CVE-2024/CVE-2024-394xx/CVE-2024-39428.json) (`2024-08-27T17:39:29.090`) -- [CVE-2024-39429](CVE-2024/CVE-2024-394xx/CVE-2024-39429.json) (`2024-08-27T17:44:02.903`) -- [CVE-2024-39430](CVE-2024/CVE-2024-394xx/CVE-2024-39430.json) (`2024-08-27T17:44:25.593`) -- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-27T16:15:07.400`) -- [CVE-2024-41285](CVE-2024/CVE-2024-412xx/CVE-2024-41285.json) (`2024-08-27T16:03:16.043`) -- [CVE-2024-43336](CVE-2024/CVE-2024-433xx/CVE-2024-43336.json) (`2024-08-27T16:00:25.177`) -- [CVE-2024-43911](CVE-2024/CVE-2024-439xx/CVE-2024-43911.json) (`2024-08-27T16:08:52.493`) -- [CVE-2024-44932](CVE-2024/CVE-2024-449xx/CVE-2024-44932.json) (`2024-08-27T16:08:45.020`) -- [CVE-2024-44933](CVE-2024/CVE-2024-449xx/CVE-2024-44933.json) (`2024-08-27T16:08:38.973`) -- [CVE-2024-44934](CVE-2024/CVE-2024-449xx/CVE-2024-44934.json) (`2024-08-27T16:07:58.727`) -- [CVE-2024-44935](CVE-2024/CVE-2024-449xx/CVE-2024-44935.json) (`2024-08-27T16:09:01.633`) -- [CVE-2024-44937](CVE-2024/CVE-2024-449xx/CVE-2024-44937.json) (`2024-08-27T16:10:11.423`) -- [CVE-2024-44942](CVE-2024/CVE-2024-449xx/CVE-2024-44942.json) (`2024-08-27T16:09:10.010`) -- [CVE-2024-5182](CVE-2024/CVE-2024-51xx/CVE-2024-5182.json) (`2024-08-27T17:30:21.127`) -- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-08-27T17:56:02.507`) -- [CVE-2024-6978](CVE-2024/CVE-2024-69xx/CVE-2024-6978.json) (`2024-08-27T16:17:54.077`) -- [CVE-2024-8081](CVE-2024/CVE-2024-80xx/CVE-2024-8081.json) (`2024-08-27T16:12:33.580`) -- [CVE-2024-8083](CVE-2024/CVE-2024-80xx/CVE-2024-8083.json) (`2024-08-27T16:11:35.730`) -- [CVE-2024-8084](CVE-2024/CVE-2024-80xx/CVE-2024-8084.json) (`2024-08-27T16:11:11.460`) -- [CVE-2024-8170](CVE-2024/CVE-2024-81xx/CVE-2024-8170.json) (`2024-08-27T16:02:50.577`) -- [CVE-2024-8171](CVE-2024/CVE-2024-81xx/CVE-2024-8171.json) (`2024-08-27T16:02:19.150`) -- [CVE-2024-8172](CVE-2024/CVE-2024-81xx/CVE-2024-8172.json) (`2024-08-27T16:01:35.047`) +Recently modified CVEs: `75` + +- [CVE-2024-3088](CVE-2024/CVE-2024-30xx/CVE-2024-3088.json) (`2024-08-27T18:35:09.493`) +- [CVE-2024-31033](CVE-2024/CVE-2024-310xx/CVE-2024-31033.json) (`2024-08-27T18:35:09.280`) +- [CVE-2024-31498](CVE-2024/CVE-2024-314xx/CVE-2024-31498.json) (`2024-08-27T19:35:26.363`) +- [CVE-2024-38547](CVE-2024/CVE-2024-385xx/CVE-2024-38547.json) (`2024-08-27T19:56:36.727`) +- [CVE-2024-38549](CVE-2024/CVE-2024-385xx/CVE-2024-38549.json) (`2024-08-27T19:57:48.560`) +- [CVE-2024-38551](CVE-2024/CVE-2024-385xx/CVE-2024-38551.json) (`2024-08-27T19:54:39.717`) +- [CVE-2024-38552](CVE-2024/CVE-2024-385xx/CVE-2024-38552.json) (`2024-08-27T19:55:05.303`) +- [CVE-2024-38553](CVE-2024/CVE-2024-385xx/CVE-2024-38553.json) (`2024-08-27T19:45:18.157`) +- [CVE-2024-38554](CVE-2024/CVE-2024-385xx/CVE-2024-38554.json) (`2024-08-27T19:55:32.897`) +- [CVE-2024-38555](CVE-2024/CVE-2024-385xx/CVE-2024-38555.json) (`2024-08-27T19:54:04.720`) +- [CVE-2024-38591](CVE-2024/CVE-2024-385xx/CVE-2024-38591.json) (`2024-08-27T18:36:09.777`) +- [CVE-2024-38597](CVE-2024/CVE-2024-385xx/CVE-2024-38597.json) (`2024-08-27T18:36:47.313`) +- [CVE-2024-38598](CVE-2024/CVE-2024-385xx/CVE-2024-38598.json) (`2024-08-27T18:36:57.630`) +- [CVE-2024-39248](CVE-2024/CVE-2024-392xx/CVE-2024-39248.json) (`2024-08-27T18:32:45.907`) +- [CVE-2024-39427](CVE-2024/CVE-2024-394xx/CVE-2024-39427.json) (`2024-08-27T18:32:28.710`) +- [CVE-2024-40395](CVE-2024/CVE-2024-403xx/CVE-2024-40395.json) (`2024-08-27T18:33:14.247`) +- [CVE-2024-41622](CVE-2024/CVE-2024-416xx/CVE-2024-41622.json) (`2024-08-27T18:35:10.613`) +- [CVE-2024-43788](CVE-2024/CVE-2024-437xx/CVE-2024-43788.json) (`2024-08-27T18:33:14.247`) +- [CVE-2024-44340](CVE-2024/CVE-2024-443xx/CVE-2024-44340.json) (`2024-08-27T18:35:11.777`) +- [CVE-2024-44341](CVE-2024/CVE-2024-443xx/CVE-2024-44341.json) (`2024-08-27T18:35:12.540`) +- [CVE-2024-44342](CVE-2024/CVE-2024-443xx/CVE-2024-44342.json) (`2024-08-27T18:35:13.327`) +- [CVE-2024-45264](CVE-2024/CVE-2024-452xx/CVE-2024-45264.json) (`2024-08-27T18:33:14.247`) +- [CVE-2024-8033](CVE-2024/CVE-2024-80xx/CVE-2024-8033.json) (`2024-08-27T19:39:04.953`) +- [CVE-2024-8199](CVE-2024/CVE-2024-81xx/CVE-2024-8199.json) (`2024-08-27T18:33:14.247`) +- [CVE-2024-8200](CVE-2024/CVE-2024-82xx/CVE-2024-8200.json) (`2024-08-27T18:33:14.247`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 241923b6278..650fa373cae 100644 --- a/_state.csv +++ b/_state.csv @@ -9079,8 +9079,8 @@ CVE-2004-0794,0,0,163c19d20b60e50663edd4dca4c8f1c9df85839e62a8f6956089e16b7dfcd6 CVE-2004-0795,0,0,cb5662012dd15d25f542a169f7d5d2428776c7736cb1456a4e8af553f0091610,2017-07-11T01:30:28.840000 CVE-2004-0796,0,0,9745aab5b7c15c50fdbb87e13d138d16defefb448b5088459387fd1115934bb5,2017-10-11T01:29:34.183000 CVE-2004-0797,0,0,bcd7f1392f534f288b5a2e0845691a53a790c5d440541f1ea15319d0cc30fa7a,2022-06-22T16:40:46.360000 -CVE-2004-0798,0,1,b90b949f3e9826944d679d0efdd79e0b6ac1f9a334518750cad16eff207e988c,2024-08-27T17:48:24.383000 -CVE-2004-0799,0,1,be73d577a3a7a24c6364c3f91e0c1b88942531e58e4cab61d076c24735e07f0f,2024-08-27T17:48:24.383000 +CVE-2004-0798,0,0,b90b949f3e9826944d679d0efdd79e0b6ac1f9a334518750cad16eff207e988c,2024-08-27T17:48:24.383000 +CVE-2004-0799,0,0,be73d577a3a7a24c6364c3f91e0c1b88942531e58e4cab61d076c24735e07f0f,2024-08-27T17:48:24.383000 CVE-2004-0800,0,0,9047c5996e65eb0dea79925035da28284a309dfbe01d3fb4221b168be8a16b57,2018-10-30T16:25:37.090000 CVE-2004-0801,0,0,204c36bf5851538e0d03bacf435c8fa31aa61b498f2e466a3d6b1e0ad518a124,2017-07-11T01:30:29.183000 CVE-2004-0802,0,0,cabea4e1cc5a6b2ec2b31323b794274f09c6ecb3d3e71c73a88b7fea286ff381,2017-07-11T01:30:29.277000 @@ -25498,7 +25498,7 @@ CVE-2007-2598,0,0,5c299455243ea4038ff6a8e1486acd7941a7e4cc3d1ffdf79883772c491dce CVE-2007-2599,0,0,618b3eb3ff2113fdca3ba4d282e35f296d21ea767295deb4333c1be44337d0a4,2017-10-11T01:32:17.940000 CVE-2007-2600,0,0,8d26681174f85fedfd1fc2896c99fa3c433e89057060ff763ac87a2e9b7867da,2017-10-11T01:32:17.987000 CVE-2007-2601,0,0,7ef34180b586721473b59a8eb609828aec655ede03f8a6c0c20a8ee88ad8229f,2017-10-11T01:32:18.050000 -CVE-2007-2602,0,1,73953573944a9da8fedceaf0e98e77841dfdab6cd1cef38efb3cc438cfcebabb,2024-08-27T17:48:24.383000 +CVE-2007-2602,0,0,73953573944a9da8fedceaf0e98e77841dfdab6cd1cef38efb3cc438cfcebabb,2024-08-27T17:48:24.383000 CVE-2007-2603,0,0,46a9dd23434bcace8ce55c225b0baef5af36e2c9f8bc1d16c82143c39b65d32d,2018-10-16T16:44:42.650000 CVE-2007-2604,0,0,d8dca3b7b83707fd9dff31519acf7c49d7a3e5be8d451855470c3a437f4c601c,2018-10-16T16:44:42.993000 CVE-2007-2605,0,0,fcbbb978caf598ee643b4494fc470bd5620cc71f17faba1620fc267526bdcad6,2018-10-16T16:44:43.323000 @@ -54165,7 +54165,7 @@ CVE-2012-2596,0,0,8b7a3e6c55b8e5cb39525be84c4f0b60187b69af69bfb8a1c11f78bdd705fd CVE-2012-2597,0,0,58a64df34f4ca9e37c4a061158b4e0b46b6964dd19823adc5f8f1e7897e7da05,2012-06-12T04:00:00 CVE-2012-2598,0,0,1957f6d0983b267e4882fbcd84cc1d4c2c7f163652fccd112407ce90a67d34e2,2012-06-12T04:00:00 CVE-2012-2599,0,0,7f0a81b6f02abf08b561dfb9b64d92fdb00de97e6fa039807538b8602d7dbe11,2023-11-07T02:10:38.473000 -CVE-2012-2601,0,1,27b91d722f52fadaa313127a269d53e760c594616dd874afa64295e35862ee69,2024-08-27T17:48:24.383000 +CVE-2012-2601,0,0,27b91d722f52fadaa313127a269d53e760c594616dd874afa64295e35862ee69,2024-08-27T17:48:24.383000 CVE-2012-2602,0,0,9f4a2a2d301084684f8fd7ed9fdd6f4428d44850435bd7c679a01ed02498b3a1,2012-08-13T04:00:00 CVE-2012-2603,0,0,3ba0a20622c897320d860960a863df1fe645b178f74fc78fbb6160c045fc7605,2012-06-28T04:00:00 CVE-2012-2604,0,0,dd42440cc37ed1bff58d600a2b407addd4a737c3614e18b70fb9b58fe0533932,2012-06-13T15:55:01.290000 @@ -55698,7 +55698,7 @@ CVE-2012-4340,0,0,77d28833cf96f92d96d41dc5db0926a75a492a47ae21d8226f3994fa315dbb CVE-2012-4341,0,0,404e67c3628b4d6ca272c64110a3ea484b37b6af795ce906a35c3efe847df98d,2023-11-07T02:11:50.587000 CVE-2012-4342,0,0,e86fd45827576c41f14174273ca8912e031852003eca3f83a0f57412dfed13e9,2012-10-09T04:00:00 CVE-2012-4343,0,0,8f2123066aee412fda9822d4f858250a3ff798eaf6c56ca312b8ddc19ca25c32,2012-08-16T04:00:00 -CVE-2012-4344,0,1,0585e30e348cd2b8bcd3d8b19495c930bcfaa3338ee16f63062d43aaced1273b,2024-08-27T17:48:24.383000 +CVE-2012-4344,0,0,0585e30e348cd2b8bcd3d8b19495c930bcfaa3338ee16f63062d43aaced1273b,2024-08-27T17:48:24.383000 CVE-2012-4345,0,0,1c0e36f1fd436d4ac503b42031575dce078cd92b59451c94e5b9d0dd20983a98,2013-04-02T03:20:04.500000 CVE-2012-4347,0,0,8e6ebe91e2ed52ebaa78aea3f5547fbc1a3264419b797fd4bfe77714e73cc329,2013-10-11T13:18:21.300000 CVE-2012-4348,0,0,901dbe3227d936f6c9e770630716b59792dca4bd51056b7017fa5f0888a4f742,2013-03-14T03:10:09.620000 @@ -78931,8 +78931,8 @@ CVE-2015-5998,0,0,e2016e8115d1173b4867aee71dff44d48d9bf3bac7494347936af2226a36f6 CVE-2015-5999,0,0,992cd24b2070de0b6f73e99076ecb0a36ed3249a36839c688cdb6e8be8ce8f37,2023-04-26T19:27:52.350000 CVE-2015-6000,0,0,a490964f0ff17f30ae9266be53e484b1f14509b0ebc9b606a32e4baa4a69f381,2020-02-10T15:05:02.030000 CVE-2015-6003,0,0,b45fe7f1e9d2ceb4ed97ad8d468beed27631504227d40e9c2f09946338edadf9,2016-12-08T03:11:38.533000 -CVE-2015-6004,0,1,d54f9f69f308cb8d84baf9819b4f09fde2207dddd1b550f27d590fdee810e453,2024-08-27T17:48:24.383000 -CVE-2015-6005,0,1,c7e326bc9c8ab1dff1aebb96a0d3b06804e18d77ca19936c1cb8a5540322574f,2024-08-27T17:48:24.383000 +CVE-2015-6004,0,0,d54f9f69f308cb8d84baf9819b4f09fde2207dddd1b550f27d590fdee810e453,2024-08-27T17:48:24.383000 +CVE-2015-6005,0,0,c7e326bc9c8ab1dff1aebb96a0d3b06804e18d77ca19936c1cb8a5540322574f,2024-08-27T17:48:24.383000 CVE-2015-6006,0,0,814d1190c4b7f215e95d54c6295419ad15d47409dc04af5131c9677ba4490dea,2015-10-30T19:56:44.867000 CVE-2015-6007,0,0,aea779329fb5bc86ae5be15d0539c979e13b5096744be7f23103f5846f52cf49,2015-09-29T00:48:40.560000 CVE-2015-6008,0,0,6f5b0ebd21630fc969d6866f082e4e2d8e04c378943a9700dbb3f33cb76cbea6,2017-09-16T01:29:02.607000 @@ -80988,7 +80988,7 @@ CVE-2015-8255,0,0,e5b81857fbd77415fdeb2da1705675d9f9ce3049f4801dac0c15cca4a75730 CVE-2015-8256,0,0,b7938990c4dae2759bbce8d37e729fe40a8d131bba0c1c6fe66e9db5afd103bc,2017-04-25T00:40:12.587000 CVE-2015-8257,0,0,b7f4328f8dd799a4b98c3061c1661ddf56aca0ee18380e51619cb5fd9d3df217,2017-05-16T15:27:35.623000 CVE-2015-8258,0,0,61012124b4bdcc5c1791d772f393cab7a88b2766d5bb91e57cd64ed3ad6abeed,2017-04-13T19:57:41.517000 -CVE-2015-8261,0,1,501f7e1c27c79b059b2bdcd9f7955ffcff2934c2c1ba48db574e1dd7e4f591f9,2024-08-27T17:48:24.383000 +CVE-2015-8261,0,0,501f7e1c27c79b059b2bdcd9f7955ffcff2934c2c1ba48db574e1dd7e4f591f9,2024-08-27T17:48:24.383000 CVE-2015-8262,0,0,7867b4bb0d42fab5e9b78321ec16c126af191cd62c8eedb6de18f33f0ab76e94,2016-11-28T19:46:14.217000 CVE-2015-8263,0,0,28acb775af9bee71bab626432a3bc99898070e9e519cd26aba29402fb10097cd,2016-11-28T19:46:15.407000 CVE-2015-8264,0,0,3a5576017e6485cd468f43e7ab120b21ea87b18c3dbc10c6705c73302884f1a0,2018-10-09T19:58:23.877000 @@ -83187,7 +83187,7 @@ CVE-2016-0997,0,0,c9c540b7f4561f306ac8623f9c2f61a4a4bc5e344240e576147e9f99f4437c CVE-2016-0998,0,0,f0db90f7a852fc51d1a530bff8d27e19070f467f107b457720d9332b8d59a661,2022-12-14T19:49:49.317000 CVE-2016-0999,0,0,94ef9a6e303f0ba143826857a36e5150f9573c36c5073af9bf0ba26f747dfbb8,2023-04-26T18:38:13.597000 CVE-2016-1000,0,0,077e3986ecd0d72b483ca6529c71f2e78e8e5b76f25d6605f16995180ef41be5,2022-12-14T19:44:00.990000 -CVE-2016-1000000,0,1,58ff8711e2bdb0d3f3c714c5aba03477e2446b6ab3b88339356efa88941b9af8,2024-08-27T17:48:24.383000 +CVE-2016-1000000,0,0,58ff8711e2bdb0d3f3c714c5aba03477e2446b6ab3b88339356efa88941b9af8,2024-08-27T17:48:24.383000 CVE-2016-1000001,0,0,71ea9635b1dca1cddaebf2537cf611c0f10115db08be9f7d9e6ebfa5315185a0,2017-02-19T06:16:19.183000 CVE-2016-1000002,0,0,ec6d38e64248f6c9e5f75d24be69ef7c2c0e200b56f5c323b02c9d04fa426d41,2020-08-18T15:05:49.313000 CVE-2016-1000003,0,0,e323e8c5d9643e53478b9782f337c226b246045674be49edf120bbe397a74f0e,2016-12-22T14:40:13.323000 @@ -124125,8 +124125,8 @@ CVE-2018-5770,0,0,58d430fee21f7439ac54bb211457c66f33e92e05ae78c59b4e105bed11d70c CVE-2018-5772,0,0,06a40f006931bbb740f8fdb56475cbfebc72104286d88541d14d47f8feefea52,2019-10-03T00:03:26.223000 CVE-2018-5773,0,0,af352159d17d25ce783286fd70f03358efaa67f2dd26b3ee935bc7eff090d82b,2018-02-06T13:39:20.187000 CVE-2018-5776,0,0,4bfe6e71b24b40e27a4ad4452b7cda4199ee569d9040b56ba9a648adb3e72c45,2018-02-01T15:06:19.830000 -CVE-2018-5777,0,1,11166f64e3f04a98a2a325bd20cc7e5eadbf0226d659a055f3b34d4e14fa0906,2024-08-27T17:48:24.383000 -CVE-2018-5778,0,1,6e77dd790c0dd829904651c15f9fd3b892dd5ec3a7802e6df837ac9ef28a32d1,2024-08-27T17:48:24.383000 +CVE-2018-5777,0,0,11166f64e3f04a98a2a325bd20cc7e5eadbf0226d659a055f3b34d4e14fa0906,2024-08-27T17:48:24.383000 +CVE-2018-5778,0,0,6e77dd790c0dd829904651c15f9fd3b892dd5ec3a7802e6df837ac9ef28a32d1,2024-08-27T17:48:24.383000 CVE-2018-5779,0,0,cfcc8188b2e31cd8338f0d7863692309c403849463fecce565ddc62ffbfb4c00,2018-09-07T18:29:00.700000 CVE-2018-5780,0,0,d94b420aba35e6599a6579918c56642f16392c889b8ff93c3ad752b2e8c2ddb2,2018-09-07T18:29:00.797000 CVE-2018-5781,0,0,d3d64ae79cb03138a6e559cb7d5b3d603d6db0ca2510d314ddb200c711bf426c,2018-09-07T18:29:00.873000 @@ -126568,8 +126568,8 @@ CVE-2018-8934,0,0,d91a4b5c40d75539d64f51e326eed018f8e9f926053051a68c23f8e68edfb9 CVE-2018-8935,0,0,e7fb291f9ff76205bf30cf392b24737cf326b9626d956d63183c901c3c902cc0,2019-10-03T00:03:26.223000 CVE-2018-8936,0,0,53d52e5bcf53077278de33471625e49e1ce6e2d37de0f9e66dc24e0495fc3758,2019-10-03T00:03:26.223000 CVE-2018-8937,0,0,1bf0f252c1721f61fd25863a01462de0c9a74ea41e51b871f5d32b425e2ae32c,2018-04-20T17:58:35.227000 -CVE-2018-8938,0,1,3de70ae8a646cce0bb75447fbd6256e5cdfa1ae505c51bf47162660ebd77c264,2024-08-27T17:48:24.383000 -CVE-2018-8939,0,1,5f4e9199a4b3f391112b59125cc541701fb8329d6dba4890bbfc6dd556db4f8d,2024-08-27T17:48:24.383000 +CVE-2018-8938,0,0,3de70ae8a646cce0bb75447fbd6256e5cdfa1ae505c51bf47162660ebd77c264,2024-08-27T17:48:24.383000 +CVE-2018-8939,0,0,5f4e9199a4b3f391112b59125cc541701fb8329d6dba4890bbfc6dd556db4f8d,2024-08-27T17:48:24.383000 CVE-2018-8940,0,0,cf53680e796e6e718ff28b95e06f17b1361de4cd4b9ca095ad0f75187909b24c,2019-05-15T13:48:12.647000 CVE-2018-8941,0,0,09d2c74d2809c40de539b2b4ea7bf0de653f800fdaace965088e4ccace3de4f0,2023-04-26T18:55:30.893000 CVE-2018-8942,0,0,677206f207a9cacd94f539b988a16dbb84890a7895021d2b6ca9aaf4d3c0ed6b,2018-04-18T01:38:26.767000 @@ -136133,7 +136133,7 @@ CVE-2019-19045,0,0,fc01e461bb9b2ba8974285aa95a998c79b0de7295691eb276f75da5096908 CVE-2019-19046,0,0,29f0169712cb176eb133c3619fd121e85641c1e247b25765997a37b092cc33c5,2024-08-05T02:15:57.587000 CVE-2019-19047,0,0,0e7737100319e03cb0b83f3d90a8c402cffc2f1292282edf1de2fa1ef0923c89,2020-08-24T17:37:01.140000 CVE-2019-19048,0,0,db07d8da03a9e9a9fbc05a6b48c21c9ab7e60e2b75fe2603a423df23685c997e,2023-01-17T21:32:10.783000 -CVE-2019-19049,0,0,ed5f89a9c84b426708860760ffd713d81f94525fe43cae76c5901553d0632099,2024-08-05T02:15:57.810000 +CVE-2019-19049,0,1,e330d8745dc6ac299dfc9c92c74d7175c2753f04cc17d41829f8773942305ac4,2024-08-27T18:44:14.520000 CVE-2019-1905,0,0,69c7f3b62e394447902822ba2ec444464634c488c7230e9a2a3c0b8ec892d842,2019-10-09T23:48:30.987000 CVE-2019-19050,0,0,cdc05e07a8d47c6d5cbc1e6f7215c6685af1d77c83f05a1d42a6f7963dcbc7c9,2023-11-07T03:07:24.293000 CVE-2019-19051,0,0,295b1fe67bc75003432a4ec3224e24b22c7ff4dd3e9f42640dd64642238774ef,2022-11-07T14:55:55.527000 @@ -136150,7 +136150,7 @@ CVE-2019-19060,0,0,23fd6d3274a6e32e35a24a697e82921004ff2644dd60ff0d73308aea43b25 CVE-2019-19061,0,0,e4e170f9e3e6615177d4da116e229e9e512fea636006122a40c08ed09bb01f6c,2023-01-19T20:08:29.547000 CVE-2019-19062,0,0,ec645ecd0e91a1d60b5cc1fe3d10bb0ab72df5e5bd41aabd82c21c6792b822ce,2023-11-07T03:07:27.043000 CVE-2019-19063,0,0,299e8e500ec2e02cbb9d3957ed397e889c05cb95b2123e5ff9c122ac302e5fd6,2023-11-07T03:07:27.137000 -CVE-2019-19064,0,0,2e271845a8b9d1150f95eabf17d18e1475f1194d0cb7194580b4d90f43346b9c,2024-08-05T02:15:58.570000 +CVE-2019-19064,0,1,2ea1431a57a8aa85ddd720f2eae24365fe3628242f5539278abcb7b3204d848c,2024-08-27T19:38:19.673000 CVE-2019-19065,0,0,3b53dd34c7b106112e3313db77b2f9f60c75df38be7808454550143c0c436f33,2024-08-05T02:15:58.677000 CVE-2019-19066,0,0,a42e595615ac1288c4e5f9737428e321bc5b3e1ce595e39bc49860b62f9b2798,2023-11-07T03:07:27.377000 CVE-2019-19067,0,0,21c60c0589e856788f81153cf254f0ba2c34cb413df62b70d73735206dd99373,2024-08-05T02:15:58.843000 @@ -180347,7 +180347,7 @@ CVE-2021-38156,0,0,7093c4be273c44b51d624a0582321085d0d7e6a29dc97438a15b8f95294f4 CVE-2021-38157,0,0,97edafe64be1568552092835ff813b82b20d2c0ff91f731c02a247ed76bd19dd,2024-08-04T02:15:30.733000 CVE-2021-38159,0,0,79393c41bcd337d8c607644e021b3415da5e3fe32adf94fcef38b8960a376bf1,2021-08-14T15:53:34.980000 CVE-2021-3816,0,0,30dc11b7e36e4e3f77a9924804066eddf19b6d8fa65eeebf9c2e536bf2e9f37b,2022-01-25T16:19:11.950000 -CVE-2021-38160,0,0,5908712b758be696b0aed2c30099bb827d80e94460d9adfc0c281bb9359f46b3,2024-08-04T02:15:30.860000 +CVE-2021-38160,0,1,e85865d058aca3e839a3938c3fb48ce2be06a45e6238c8ca662b74f7770fcf16,2024-08-27T19:37:50.600000 CVE-2021-38161,0,0,f12d82ddd230e7d5307906a2d35bd6f9146d06ee99699b4b198df41fc34d4ff0,2022-10-25T15:30:25.020000 CVE-2021-38162,0,0,1bf6bc4e3a2a8094f32230f1da0537535558a0ea76cacb4f46bdaeb71711a51f,2023-07-10T18:15:10.387000 CVE-2021-38163,0,0,35bb994b2593f35cdff51ee6a670348a5203e05a395d0a30e2d39b88b8e9bea2,2024-06-28T14:14:53.897000 @@ -187439,7 +187439,7 @@ CVE-2021-47586,0,0,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e20374301831 CVE-2021-47587,0,0,b30550a10bae30fdaddfdf1118241fdecdb0aac764064035e93107f946fad012,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000 CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19 -CVE-2021-47590,0,1,f39be5f78d966c2d22d67b4496d2a7538ff62fc77cf57a6c71df81c4fb431fce,2024-08-27T16:14:56.530000 +CVE-2021-47590,0,0,f39be5f78d966c2d22d67b4496d2a7538ff62fc77cf57a6c71df81c4fb431fce,2024-08-27T16:14:56.530000 CVE-2021-47591,0,0,075ff96a49ab3870794068c07184348561582a3968bb161ed2673754442a5134,2024-06-20T12:43:25.663000 CVE-2021-47592,0,0,3e6a900f856612ffa91a686567e21f4c94ed7d6a279efc65d48294ed49768d05,2024-06-20T12:43:25.663000 CVE-2021-47593,0,0,d7a43d01ab4a125b4e19b7cc66507d59f9c795640b357b5f69d8e118285d751e,2024-06-20T12:43:25.663000 @@ -187447,25 +187447,25 @@ CVE-2021-47594,0,0,39ee68b0bea20520811a251d6cea7a263960b1fe82747511fa8952fffe9e3 CVE-2021-47595,0,0,a5c7de083f6b9294a72a621ab5d4d3b5d2e23f529c737eb80cb272e2bd0ff631,2024-06-20T12:43:25.663000 CVE-2021-47596,0,0,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000 CVE-2021-47597,0,0,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000 -CVE-2021-47598,0,1,f212e8f5248b2a91eca1c18c921ffe8dcf284ef4e373f68a8749d1452432a2be,2024-08-27T16:14:48.593000 +CVE-2021-47598,0,0,f212e8f5248b2a91eca1c18c921ffe8dcf284ef4e373f68a8749d1452432a2be,2024-08-27T16:14:48.593000 CVE-2021-47599,0,0,08ed62254e7ecb9b8e7d1adde943234640f9a513c87ff0831ce11a99dd48bc77,2024-06-20T12:43:25.663000 -CVE-2021-47600,0,1,75cc3b8f9f4b82a2dba36cc9c8cf2cf73a752aa22859fcd049e14203568be90d,2024-08-27T16:14:38.423000 -CVE-2021-47601,0,1,7e4eec57dea85ff7c42442dd774d3b6a4d991000ef8c50e5b20a9ac0d710c596,2024-08-27T16:14:33.227000 +CVE-2021-47600,0,0,75cc3b8f9f4b82a2dba36cc9c8cf2cf73a752aa22859fcd049e14203568be90d,2024-08-27T16:14:38.423000 +CVE-2021-47601,0,0,7e4eec57dea85ff7c42442dd774d3b6a4d991000ef8c50e5b20a9ac0d710c596,2024-08-27T16:14:33.227000 CVE-2021-47602,0,0,217373f24d1538113364e9a20807c56c528cffaaabacdafeb2f2e23412f68cc3,2024-06-20T12:43:25.663000 CVE-2021-47603,0,0,86761f5d59a68c4485664bbeeb1962970f5d48b4cf7067142a29c796a3fa71e8,2024-06-20T12:43:25.663000 -CVE-2021-47604,0,1,ac31811ff3ea9487872dcb752719657552aafd373d8cbc184273811f43ff1778,2024-08-27T16:14:27.793000 +CVE-2021-47604,0,0,ac31811ff3ea9487872dcb752719657552aafd373d8cbc184273811f43ff1778,2024-08-27T16:14:27.793000 CVE-2021-47605,0,0,3081571158d2338d282550bef6eda6211517213c80f981c9a10c8de92b5f09f9,2024-06-20T12:43:25.663000 CVE-2021-47606,0,0,1b6f001fc78e7d894961d1d6e1b1ad17df9148ecf02509aefb567ce294393bba,2024-06-20T12:43:25.663000 CVE-2021-47607,0,0,466cf23ad91b2e040a4c28e81e3756fd6709b746cea60e8522b3eb46b652dfcc,2024-06-20T12:43:25.663000 CVE-2021-47608,0,0,d78dccafcd258413b1f868a68330ca12fdd652e4eb37e67094a9c1b95992d5aa,2024-06-20T12:43:25.663000 CVE-2021-47609,0,0,82e9d9e4dc88258f06db32a057ccbff5c841ba6eb746d42ce1540884ba946ffa,2024-06-20T12:43:25.663000 -CVE-2021-47610,0,1,37f0f9bf2a6c534057e2bd73a9a69b473a415dbff8fc146dda3211d4f97f8e8d,2024-08-27T16:14:20.873000 +CVE-2021-47610,0,0,37f0f9bf2a6c534057e2bd73a9a69b473a415dbff8fc146dda3211d4f97f8e8d,2024-08-27T16:14:20.873000 CVE-2021-47611,0,0,665b802f589a4b4258cb4c8345015ba4e79bab1d249e832af66b710e7098928b,2024-06-20T12:43:25.663000 -CVE-2021-47612,0,1,ac5be9c7b1ebb02dafa61f249fef1152946222a41f8528a41d51e457e08535d1,2024-08-27T16:14:13.877000 +CVE-2021-47612,0,0,ac5be9c7b1ebb02dafa61f249fef1152946222a41f8528a41d51e457e08535d1,2024-08-27T16:14:13.877000 CVE-2021-47613,0,0,642703d9671fc407abe219c3770e567651dc20dc07d591d5ba5177a9d5d4e40b,2024-06-20T12:43:25.663000 -CVE-2021-47614,0,1,ef802c1c34c90a0409b0849796fe5ab3fdfe8e1064cf9d9b5bcc370d68a7918d,2024-08-27T16:14:06.177000 +CVE-2021-47614,0,0,ef802c1c34c90a0409b0849796fe5ab3fdfe8e1064cf9d9b5bcc370d68a7918d,2024-08-27T16:14:06.177000 CVE-2021-47615,0,0,3bc3df92b69fdab3bdde99978f3d8804c002c34343decddd85839db0c37e920e,2024-06-20T12:43:25.663000 -CVE-2021-47616,0,1,df02274307ce6160ecca6b3896e04e852b158704d05111c568a6cd060f1afb3e,2024-08-27T16:13:59.120000 +CVE-2021-47616,0,0,df02274307ce6160ecca6b3896e04e852b158704d05111c568a6cd060f1afb3e,2024-08-27T16:13:59.120000 CVE-2021-47617,0,0,174885baf195ea856ab0f44445ac6a3f70dd31281a9cea4d13f0e12108a3d3c2,2024-06-20T12:43:25.663000 CVE-2021-47618,0,0,2a314532463f641de5a1abcd70cc0a94c3a5563bdb37f6cd3ebfada5f84160e6,2024-06-20T12:43:25.663000 CVE-2021-47619,0,0,3423ea9cbab93af03ecb9855e0285f5e2851c0e4b6812bafeb4e82921247592c,2024-06-20T12:43:25.663000 @@ -197918,10 +197918,10 @@ CVE-2022-29841,0,0,5ee48a0acad75beb9c9637549f898463d63cf74e6b116f2e22c2ff7dc8966 CVE-2022-29842,0,0,655acfcf379e7cda595391c75eeefdc2819af14a7c86bff55440d30380c0b91c,2023-05-18T21:19:29.820000 CVE-2022-29843,0,0,024c288cac34c5f477f8328d1aa8a246401905ca6a9a056b84946282aa3fdd65,2023-02-01T16:47:13.087000 CVE-2022-29844,0,0,04bf709e8a9b88005c01e33af9f0e9102733b1472aafba9b853aa8ca254ab738,2023-02-01T16:48:43.937000 -CVE-2022-29845,0,1,527302715d9c2013eee4604a30bcd97a044234a440ee0c0b8d0ac862a9f284ce,2024-08-27T17:48:24.383000 -CVE-2022-29846,0,1,230dec6e4f22f7c2098c7177cef6e0e277d8bde1700253ee6e86e84f809f68b2,2024-08-27T17:48:24.383000 -CVE-2022-29847,0,1,e2f92767a3824e8d87f773d6bbf292b80803018d50a88940fce316f05abe0e35,2024-08-27T17:48:24.383000 -CVE-2022-29848,0,1,e10e3c265341ba044f8cf386c45aeb03db3ef9598c0adc930fd4428b84dfda42,2024-08-27T17:48:24.383000 +CVE-2022-29845,0,0,527302715d9c2013eee4604a30bcd97a044234a440ee0c0b8d0ac862a9f284ce,2024-08-27T17:48:24.383000 +CVE-2022-29846,0,0,230dec6e4f22f7c2098c7177cef6e0e277d8bde1700253ee6e86e84f809f68b2,2024-08-27T17:48:24.383000 +CVE-2022-29847,0,0,e2f92767a3824e8d87f773d6bbf292b80803018d50a88940fce316f05abe0e35,2024-08-27T17:48:24.383000 +CVE-2022-29848,0,0,e10e3c265341ba044f8cf386c45aeb03db3ef9598c0adc930fd4428b84dfda42,2024-08-27T17:48:24.383000 CVE-2022-29849,0,0,07257c98d5c9b16c03338c85c1a35da20248b6fc1f4d1ce6f52ebd50284bdf8d,2023-08-08T14:22:24.967000 CVE-2022-2985,0,0,b008ba547fef5040a8e3641045d6457c5ec7d2566393e005278e0a7fdde6f4a7,2022-10-18T19:33:57.623000 CVE-2022-29850,0,0,02add66e4e241bd4e7017271009354644c5b95f153657073eb55af9031b6ca1e,2023-08-08T14:22:24.967000 @@ -201393,7 +201393,7 @@ CVE-2022-34265,0,0,fc950ca1e3f54cd970a0dbf608c39f846b97dc896b84fc8a6ec68fcd698a3 CVE-2022-34266,0,0,557fb7394cbbe9eacb6b5b35000534f3ca6cb23b7eab5719edaf381e581c668e,2022-09-23T15:19:54.597000 CVE-2022-34267,0,0,0079fc66602e72d5c2594a90774759c916a60052b2b6090492949883e022a933,2024-01-04T01:19:05.293000 CVE-2022-34268,0,0,1e0db119741017d8de4c1b7c1f1cdb028c7106b341d87a193a3ba87d46af2dbe,2024-01-03T23:10:41.060000 -CVE-2022-34269,0,0,cf8159c3ebb11ab8a9a4d77da0bf7de5f45812f3c197d4715b092613b17654f1,2024-02-29T13:49:47.277000 +CVE-2022-34269,0,1,f9587d4351096b71548f044c6a9f4b2407ca3f3e91dc87bd5c6c8f1cf087abbf,2024-08-27T18:35:00.573000 CVE-2022-3427,0,0,710d56f10629ce45fd03f70d8b89c63fb345e4e1fabb40e9fa63e7c475c4f843,2023-11-07T03:51:14.290000 CVE-2022-34270,0,0,7e9d5beea9d538ec33f87a5dca04906e81cdb3b68c67d8442f6a52d41e6185aa,2024-08-01T13:42:46.790000 CVE-2022-34271,0,0,31f548b27df0dcd3bebe3ca096fdf47ffee64dc6a056d36fde164e373b96f9ac,2023-11-07T03:48:31.317000 @@ -205857,6 +205857,8 @@ CVE-2022-39987,0,0,935e129be5736816f1f64b48bbd72f708d4658000d85ae733b0eebdff57e6 CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3854,2022-10-06T23:35:22.903000 CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000 CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000 +CVE-2022-39996,1,1,a673538646be2b526556cda7803815db135ba40e765c7cbfeac91111057cf042,2024-08-27T19:35:01.613000 +CVE-2022-39997,1,1,1309ea0328785e03a7575bb8d3a68e06eea3a09084972b8522156f94cd4c6507,2024-08-27T19:15:15.953000 CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000 CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000 CVE-2022-40001,0,0,53944e40d3dc029fd806c75d13f9eb446512b7b5067631d8fcb6e9c0e4408b76,2022-12-19T16:23:53.913000 @@ -211098,7 +211100,7 @@ CVE-2022-47029,0,0,dac88acc9e43cb003b1a7430fff934a8916419fa700cf52d04932dd0cb2b6 CVE-2022-4703,0,0,f78248b31accf080599354486580964f551255ff6ed6ef09d177a7a907159dd7,2023-11-07T03:58:37.930000 CVE-2022-47034,0,0,98aa3b88fe44ebebdd6f3403032d5dd494d3c3f436ddb19e226483cbe52d4913,2023-02-22T20:14:11.913000 CVE-2022-47035,0,0,9c17a783de3d1c4fb79c08594df7b8d1d253df4680033940ecf4fcd5e91855a7,2023-02-07T21:48:39.107000 -CVE-2022-47036,0,1,84ccdae8945fd71a15ab9452a4e4d6a0a8c398529c2b242f0fb11dc552cd514c,2024-08-27T17:35:01.233000 +CVE-2022-47036,0,0,84ccdae8945fd71a15ab9452a4e4d6a0a8c398529c2b242f0fb11dc552cd514c,2024-08-27T17:35:01.233000 CVE-2022-47037,0,0,4642170ef4d1d57857d2c14f41831941268cb1a303a79e288c7bfcfddc1fd411,2024-08-01T13:43:04.093000 CVE-2022-4704,0,0,46af92468c03d8a14d68056eeb3062570290bd5634248e988990bd16456ff359,2023-11-07T03:58:38.160000 CVE-2022-47040,0,0,17f0056871c82cc5c6c5c59f8133dacdaed97db32f71e20007f765b1815456cf,2023-02-06T16:23:30.867000 @@ -212114,7 +212116,7 @@ CVE-2022-48622,0,0,8603f3223b9efff6b371bdc90b7040dc59471154fa80a88ca2d72860d2113 CVE-2022-48623,0,0,903da016b4a21385c85cb533e0b0fbe60d9e83c91876ab8bbe25078b9f10265b,2024-08-19T17:35:04.530000 CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,5d912021e84b827be17b6fcdcc1fceb7197614c850a6ba728db3d8a621c14c33,2024-02-20T19:50:53.960000 -CVE-2022-48626,0,0,c32c60613e37af211db942e0a371f8ea3f4c06fe2f5b699006edd94c8eb1383b,2024-04-17T19:28:53.540000 +CVE-2022-48626,0,1,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000 CVE-2022-48627,0,0,1c5ba43c57e15c20868a7719b8b597bd7966d9eb144dc2e8795a79d72f631cf4,2024-06-27T12:15:13.380000 CVE-2022-48628,0,0,ceea607df19dd86785346a0794b198b9994cba32c0926340c10f946e11d1e532,2024-03-04T13:58:23.447000 CVE-2022-48629,0,0,e891c69ca957bbf297b8083e0219ef44c2d49f5751aae1302d2d546d861aa415,2024-03-21T02:44:43.813000 @@ -212423,20 +212425,20 @@ CVE-2022-48909,0,0,60753974402d7b9dc0b7da2840cff75c54ff83e7db7e3cd742fa083f4cbfd CVE-2022-4891,0,0,a455b0842f19c717ee670b5db60155cb5018f293a7aaf3547e3c50a0a475a09d,2024-05-17T02:17:01.767000 CVE-2022-48910,0,0,c49907901e2444dc6fb276986d8fa7581490f1e186329d0375e706884b0faf75,2024-08-22T12:48:02.790000 CVE-2022-48911,0,0,67b19231003646107ba5487b8e675d3ea3a96bd38a2a1b84a09cad34ba506685,2024-08-22T12:48:02.790000 -CVE-2022-48912,0,1,4685b9e0b04647e6391699b48fe4ec760b8fb2a11c99c401b692a1b301b0a4c2,2024-08-27T16:12:47.173000 -CVE-2022-48913,0,1,713c03b83b436a4ed81d31fa61e38a9c0b02c5d54599e753ca949890fd4f7312,2024-08-27T16:12:58.620000 +CVE-2022-48912,0,0,4685b9e0b04647e6391699b48fe4ec760b8fb2a11c99c401b692a1b301b0a4c2,2024-08-27T16:12:47.173000 +CVE-2022-48913,0,0,713c03b83b436a4ed81d31fa61e38a9c0b02c5d54599e753ca949890fd4f7312,2024-08-27T16:12:58.620000 CVE-2022-48914,0,0,17a954177f70a24d9987d801118d084e4480c7c3850b7fa42f10a93117b17e59,2024-08-22T12:48:02.790000 -CVE-2022-48915,0,1,c80b107b935c48929981801a893b263b71560ca74e5ba8b7bdc00b678cfcbb35,2024-08-27T16:07:09.037000 +CVE-2022-48915,0,0,c80b107b935c48929981801a893b263b71560ca74e5ba8b7bdc00b678cfcbb35,2024-08-27T16:07:09.037000 CVE-2022-48916,0,0,8f20ce1d1c5363f5f68e39b98839eaf52bfa07c01964cca89491dcdb59190093,2024-08-22T12:48:02.790000 CVE-2022-48917,0,0,58439b65e36dbb2ade45a1620a3a14ca27906f33b947d1f0a9005280949a5eee,2024-08-22T12:48:02.790000 -CVE-2022-48918,0,1,dcfb706418ae75fe3a7007d02977541ca10039ee009c0974217f4396febbaf6a,2024-08-27T16:07:19.127000 -CVE-2022-48919,0,1,e5790babb6da0b073ed5bbf67690020a0aac3bba58730f51363a0ef2d8059741,2024-08-27T16:07:32.900000 +CVE-2022-48918,0,0,dcfb706418ae75fe3a7007d02977541ca10039ee009c0974217f4396febbaf6a,2024-08-27T16:07:19.127000 +CVE-2022-48919,0,0,e5790babb6da0b073ed5bbf67690020a0aac3bba58730f51363a0ef2d8059741,2024-08-27T16:07:32.900000 CVE-2022-4892,0,0,a02afb40fce024abebfb05a40298b81994dfc2b7567f3762fdb2b328cbdbe6a9,2024-05-17T02:17:01.897000 CVE-2022-48920,0,0,b393f9096ec2dd749ea58d3cba07e0b6170f7ce1e47bde6c059e20f2b353f3a4,2024-08-22T12:48:02.790000 CVE-2022-48921,0,0,565ba181b0f1f2dfc9fe72312b91e9931d175894bd53f2b2a8229bd70f9ca157,2024-08-22T12:48:02.790000 CVE-2022-48922,0,0,485fd7b1352c6198add8f08095b571046478ed9662200df59a8f5eef93ca9987,2024-08-22T12:48:02.790000 CVE-2022-48923,0,0,7c871d7f7fad4b7b8cc0fef537eadf3094068942b00174225e14cad2e67b8948,2024-08-22T12:48:02.790000 -CVE-2022-48924,0,1,7b72b5b3779cbd334a58cc81c4e33f1856c26dfe0ed7b0b6108d32c9ead83b93,2024-08-27T16:07:43.660000 +CVE-2022-48924,0,0,7b72b5b3779cbd334a58cc81c4e33f1856c26dfe0ed7b0b6108d32c9ead83b93,2024-08-27T16:07:43.660000 CVE-2022-48925,0,0,12c2847f9c2abd72fae449a80a3efdbc821679cca9a301519e7e3dab31ee93f8,2024-08-23T02:07:41.047000 CVE-2022-48926,0,0,7c14eba9301c644179737e4ff06c47dd3ab70d7b7dc5b7cdc8ddbc7cbe0a8516,2024-08-23T02:05:14.960000 CVE-2022-48927,0,0,47e842d42ecdc6f5e3e98c1aff8de17fbd61e972b7162f3074a8851d06b3bf55,2024-08-23T02:05:45.170000 @@ -217869,7 +217871,7 @@ CVE-2023-24047,0,0,7cddea95290518482ba572ba61ff6ffd7c6d10e232629e625d358672d8d46 CVE-2023-24048,0,0,c65916b10d06871abd9d0ac9956f07e67def9dc981f6a7ff3893ab568cb935e9,2024-08-01T13:43:20.007000 CVE-2023-24049,0,0,7f5a544db31b64f02d345fc1dffe034f34858f4164cc81b20851a90cc863a683,2024-08-01T13:43:20.783000 CVE-2023-2405,0,0,ff728851c53b3f2060ea00b935480fc0578d39878ec1030d59b00051e87ad9a3,2023-11-07T04:12:36.747000 -CVE-2023-24050,0,0,6cb71a2ecf84e6cab957fa9d560ba9e9056af2ee3a1aa9ba3ac6dfebf9ae2406,2024-08-01T13:43:21.560000 +CVE-2023-24050,0,1,f8a95f5932b2e8cdc5d1e2f146edde58bf3378ec3f305d0469e0a2aed2e42388,2024-08-27T19:35:03.300000 CVE-2023-24051,0,0,da2566614f35722c2e25d0bc13092f34f4e7cfd99edcf9ae6e3415de8dd3a48a,2024-08-01T13:43:22.350000 CVE-2023-24052,0,0,15db580f8c37666e0af74cc4da9b778f8a5926c7335bb4c5aa1c8695fde9d169,2024-08-01T13:43:23.130000 CVE-2023-24054,0,0,2a49b721be9be42218a52c6e6c5f5d8c6575d5cc32c6a7365e2ec43afafef21a,2023-11-07T04:08:18.513000 @@ -219641,7 +219643,7 @@ CVE-2023-26262,0,0,c072b13dbde8b5f8b8239293cc82dc4f5b88361d00968b656c6efe6c9cc05 CVE-2023-26263,0,0,0673340ba7be15962c0a73223415435f4464991e461b1b00aa1da8add064a11f,2023-04-21T04:13:20.080000 CVE-2023-26264,0,0,539b72a3788b58d6b3bf0bee772b4d3f69b2271b1ad27c8a81375756fa17c11c,2023-04-21T04:19:13.443000 CVE-2023-26265,0,0,a5a96bf4a479000dcaf17d180456468d1f58e3b8cfc40b1cb5ae0d097e5bf0c9,2023-03-02T23:05:23.857000 -CVE-2023-26266,0,0,231ad4e98dfcbe5ffaf18e9bf9cf8060be0f5dfd9bc7385a1b8d9e19558c446b,2023-03-02T23:03:39.530000 +CVE-2023-26266,0,1,48db5ce845c1a283a9e2d6356dbc1b316f83bb3f1c498b5aaf283d61acad5b0c,2024-08-27T19:40:05.087000 CVE-2023-26267,0,0,4ee62ec08f811c303cf14885467b575d838f218d3495de5ceccf08eb40bc5c42,2023-03-02T16:01:23.653000 CVE-2023-26268,0,0,acba0f9f3727dac791768c3b96e68b01dd35481cb8eeba7a893714f55c71e756,2023-05-10T16:08:34.207000 CVE-2023-26269,0,0,3fc74b2e1b6e5e008c233812fdd6e3e283304fb6cbd0cb973fc9820127806764,2023-04-18T03:15:07.593000 @@ -222309,7 +222311,7 @@ CVE-2023-29478,0,0,62088b44e781a63d746c03bb883f02ca5e6b8616e00401b2abb5928c56e04 CVE-2023-29479,0,0,3452487cc01d05d054d053273a0100beb17b0352b31fe0cf3e34c6c79982aadc,2023-05-03T16:56:35.370000 CVE-2023-2948,0,0,33cf13ba5f6d57be09bcda640459cc9c5923bc30c2c40ba887cb48b95bbc5070,2023-06-01T03:51:17.350000 CVE-2023-29480,0,0,f5120f6370e825ec7cd76ec9504018974aa6f905b2a4473f0b6503286a3c439f,2023-05-03T17:11:10.983000 -CVE-2023-29483,0,0,faeac70f60021af980caabf01b1ec748c2c7d4d26a9d5c0df53a3493760bdd97,2024-06-26T02:15:09.210000 +CVE-2023-29483,0,1,58e2322426237eca9abe7736fdf3ecdaed6c37949cdc7de712b669b3a230d8a5,2024-08-27T19:35:04.147000 CVE-2023-29484,0,0,0af1d62089b04f5905550be8f2ff1223e88f2c2513ac49736af1c0960d31fe0c,2023-10-24T13:39:23.563000 CVE-2023-29485,0,0,e981967ddc8e88bae218a4003ad11e890ad90d138e470e83005d89eedb2ad20e,2023-12-29T02:21:17.843000 CVE-2023-29486,0,0,2aad169454ea0260c268ffaf8a2260f82a7f3a7ba45b490325fc2c6b417d3b4c,2023-12-29T02:20:40.423000 @@ -223579,7 +223581,7 @@ CVE-2023-31292,0,0,86c63ed7624c906da83829af8d7a16228d71bd92409fad1a6a6bb31729607 CVE-2023-31293,0,0,fb03f86e94761a4567fbb45e6abda7083866a528eeb5fd9232086fca52394640,2024-01-08T12:56:43.097000 CVE-2023-31294,0,0,3a98781feca9af45ef3c7033ad29efa315dc6f584c66b4329c5bca248738c49a,2024-01-08T12:56:24.393000 CVE-2023-31295,0,0,8409ca4dcab9b01cdbb0011e41ef2e627b617fadc8f067760713ee5befa4a7d7,2024-01-08T12:53:25.457000 -CVE-2023-31296,0,0,78fd99d0b955e7b80794c5955cc8704e3a28cd0ecfc2b0fe18de7f5b3d42031a,2024-01-04T23:43:22.250000 +CVE-2023-31296,0,1,a01c5229e16581bd34739638cccf3d6824ffe5e3888f096137c2441aa7ecf8ec,2024-08-27T19:35:05.190000 CVE-2023-31297,0,0,d999366b150c2c85d67ecfb07318a397f6754dfda25fe0917988ff5960ee90bc,2024-01-03T20:35:00.150000 CVE-2023-31298,0,0,98e2f765c606afaf7e975d22536dc677256ea5fcd13e87530db9419a4b2450d7,2024-01-04T21:54:55.263000 CVE-2023-31299,0,0,bd6a70b4441b17a7411808fc1dd6650cdd363cac83a2c4e940fee4a1f58bd633,2024-01-08T12:56:17 @@ -224201,11 +224203,11 @@ CVE-2023-32242,0,0,dd1fe6cfd50c11e17c72cfd41fe32d83e61c2417a7c0bdb70fb6d65301738 CVE-2023-32243,0,0,3a173b5d6e0164261df25f6a48cdffba095f74b5bd10245dc41ee4333587a0d4,2023-05-23T20:17:25.427000 CVE-2023-32244,0,0,7e383b8f3193d26154fc4c6578ca4a205228b4e139350ceaf0b63e9557a8b945,2024-05-17T18:36:05.263000 CVE-2023-32245,0,0,b006dcad499643997f59b967ed8620eb8689245fc3a80c90f10d9e156aee4962,2023-11-30T04:57:29.943000 -CVE-2023-32247,0,0,6ed61dedd90284bab675cfd007656c22e76a5281d18c8e0b6ae0d0c320230d6f,2023-12-04T14:55:19.007000 +CVE-2023-32247,0,1,bebf865d48be49831da89b5efbe95ba5c65ba7bb9fcdf392add30522fbfffc8b,2024-08-27T19:37:30.927000 CVE-2023-32248,0,0,a5d678c7b7103547aa2939c989f1036addae6cfeaed1fc01872c0756f6eccb2d,2023-12-04T14:54:50.907000 CVE-2023-3225,0,0,900a6da755c932fc51f406ca2354a5ccef9c3b9baa8b65bd7ef2e31abe56ece2,2023-11-07T04:18:15.240000 CVE-2023-32250,0,0,8cac480d2c6765e6b59bc48c89c5e9286782feca7d63265d3f86771c04c5f44b,2024-08-21T18:17:13.937000 -CVE-2023-32252,0,0,d58cdd6d41b61e01636cbce96c5c95617a1fb413e4534a05ad59e2763a4df396,2023-12-04T14:53:38.480000 +CVE-2023-32252,0,1,fce0fcee1da7bf1bf465336b4b640ffd2fad098fe31d0c47eccb5e80bfff7cb1,2024-08-27T19:36:38.493000 CVE-2023-32254,0,0,04d969b843b2483c3edef280dd23a4ff386936a5d850268b83a2e741584aa99a,2024-08-21T18:21:55.587000 CVE-2023-32257,0,0,e74ac3005b85dd9bb4e730408991fe6943d75b26a83bc250461d82f29002e0b0,2024-08-22T20:30:50.603000 CVE-2023-32258,0,0,3765cc941b240ae55ac325df051cd68b23e7f4aeaf6466a32872913e20fc6f23,2024-08-22T20:30:28.627000 @@ -227458,7 +227460,7 @@ CVE-2023-36640,0,0,e20cc3aa95df4590c21babf1ea93621e3ecc1f2cbdfd6f4d2eb22bcd2e861 CVE-2023-36641,0,0,065ff0dd7cc8be6a70d90c7e06da150ed8b811a91b8d049fa33f5d755afa6446,2023-11-20T19:59:59.920000 CVE-2023-36642,0,0,28af65fcbafcf444e491880f1a78d89af4d834345108ae6cbf598bac2d1e35b8,2023-11-07T04:16:39.923000 CVE-2023-36643,0,0,58c9475ea0b9b85ea5625584c110cd8d6c77d83d24ff3fa17132192b33f5a00c,2024-08-01T13:44:07.637000 -CVE-2023-36644,0,0,8f3f3d48331dbbb9642b53d08a78b2b91ac58c75f0d92365d4d998ec9c1a7066,2024-04-04T12:48:41.700000 +CVE-2023-36644,0,1,7ab5fd888eb994e94d6cd5b7767b4382456306673d9e939c163a38020d21aef6,2024-08-27T18:35:01.707000 CVE-2023-36645,0,0,44848f2322dbe9e6efe5ab05a859b18a170a015140d660f0d42532943322bda9,2024-08-01T13:44:08.367000 CVE-2023-36646,0,0,98d9abc88bba069e5019b90b6fba014418ed8e1ff04a391fe00b4e79ce9346e5,2023-12-13T20:38:27.083000 CVE-2023-36647,0,0,b9321e695ac9d6b9e445464d228900e551e18e03ed55bca5a684c98f8a367a1e,2023-12-14T00:03:46.357000 @@ -228896,7 +228898,7 @@ CVE-2023-38423,0,0,537c6173a761a5c26cf898ac74adeb688240b3c358b089884840d2ac7b169 CVE-2023-38424,0,0,99fd4ff2cd45804a279009f8e79f45c2460852535d8a9d8c3b2de5ec9e04f78f,2023-08-03T13:57:36.100000 CVE-2023-38425,0,0,be85cd1ba5ce4b3dab7a781196e893038fb93c2e7aabf5cf3e9b4428db2d2348,2023-08-03T13:52:43.773000 CVE-2023-38426,0,0,8be487c14d40f4026f898666c19e3292110c6d2186b99164ce31fa560af60242,2023-12-22T17:04:16.507000 -CVE-2023-38427,0,0,8c1d656c64bd19fe880b3a5f9098e6dbfbf7b09a2edb677e99df2ec3ac167345,2023-11-17T18:55:13.147000 +CVE-2023-38427,0,1,f05b1b68284c205ab455c4a149a75bc8fc293184ccf2be2285c37de8eae7eb94,2024-08-27T18:54:08.123000 CVE-2023-38428,0,0,f4a809af0e056508b7dfda0d80316548cac1608ce4a052dac3c5396d76d366ce,2023-12-15T15:47:05.687000 CVE-2023-38429,0,0,806bfaee2c26630261e30d4b617ecf5e71aca09cbfffc25cc02a6c4e45bafa10,2023-12-22T21:34:39.870000 CVE-2023-3843,0,0,f3768772f60b965aa9498137bd66ecdccef50ca14144b9e479bd7aa1ea659164,2024-05-17T02:27:52.767000 @@ -229498,7 +229500,7 @@ CVE-2023-39193,0,0,3ad8b95389e83b92a344cb4402538f60b8731f4ce39ac2e8734cb37a8afd1 CVE-2023-39194,0,0,2030f9410aac6066f150fa3941eec569327600cbe4908600bc63b6e2de0988f7,2024-05-22T17:16:03.547000 CVE-2023-39195,0,0,391d56b617eb30a24d100709ce65f9da7276204fdeba761b986d8fea653b34df,2023-11-07T04:17:28.610000 CVE-2023-39196,0,0,c004f9c9ec6fb26eb6a4cbc4eacbe3f5b53b46ced05c82462b2bf03bf67c136b,2024-02-16T20:57:44.050000 -CVE-2023-39197,0,0,43261d3d8f488b476d08124d69f6ae1eddde586d3ed03a5814cf4ed04f678237,2024-01-30T02:04:00.813000 +CVE-2023-39197,0,1,a94d42f3cc501b7c2e93f89d09d428cfe0e8ab7b9ab73a2a8f307e4bf4490647,2024-08-27T19:31:28.257000 CVE-2023-39198,0,0,6e49ea8695e035176ed13316cdca5bece7b6218f5f706c07f3cbdc1db5d81235,2024-06-25T21:15:51.053000 CVE-2023-39199,0,0,7a0e64c415a7bc2b493992501b443a7db3b77e8a22d4bad19abd42cd68cf8bbc,2023-11-21T00:57:16.017000 CVE-2023-3920,0,0,1f9f72a3bd9c37be24e0dea36a1658cf630b3ff4aab5704130fc3282b0cd5e1f,2023-10-03T15:30:56.607000 @@ -230196,7 +230198,7 @@ CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000 CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000 CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000 -CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000 +CVE-2023-40106,0,1,0475b08be04d4153a33f08c726f5ef91351480d0fc8d62866c8273b0b5a46d11,2024-08-27T19:35:06.100000 CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000 CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000 CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000 @@ -232342,7 +232344,7 @@ CVE-2023-4289,0,0,97e9dbfb002f991c9b0c7bb56513ad2ad7a34e2cc2f1908f40b15808fc4c7b CVE-2023-42890,0,0,5b8aebb147e55c36aa77d8987a88db8f5e314c8eb5e78fd8ff6fd1567e1228f8,2024-06-12T10:15:26.693000 CVE-2023-42891,0,0,9e832a9c79650ad0321f807def388413064ff2ab68c6ecbf9bb18e2496c75004,2023-12-13T17:46:10.560000 CVE-2023-42892,0,0,45868be9e713d43fbe1857fd521e7819eff03e6332a2f62faa55e58f6a79244c,2024-08-21T23:35:00.660000 -CVE-2023-42893,0,1,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000 +CVE-2023-42893,0,0,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000 CVE-2023-42894,0,0,19edfaff52695d01eee4c17779921e72e391b6f067c5c5cef1a5eb99c74b0e19,2024-02-02T03:11:25.083000 CVE-2023-42896,0,0,3c59c8410e091ed4d59b2693bab0a1053ef27cc19824731090305958b40e4a73,2024-04-08T22:45:48.987000 CVE-2023-42897,0,0,0c9d3154fb34bdac1bb2062b91c9da25d4cc8ebcbefa6ce9c83d620dc434b94c,2023-12-13T20:57:23.147000 @@ -232387,14 +232389,14 @@ CVE-2023-42932,0,0,3cb102cf7e68e1277cecc63dc81679dfe99e4df141fff5c4b35346c92fa6c CVE-2023-42933,0,0,3b8c17c5c0ba5ced910707473d3012843c9017196686d732cba2ad4beed35ed0,2024-01-12T14:42:31.583000 CVE-2023-42934,0,0,a9110a5629842c61131134d6090bcf7298d6377dd5054caff3ef2d2a408ccef5,2024-01-16T23:52:48.783000 CVE-2023-42935,0,0,59f1893c4921fd426d37a2853de577c0f93471971948ece90123be426c829c77,2024-01-29T18:38:29.587000 -CVE-2023-42936,0,0,05c300747a5e90d9dfbea1318088c0103520c0817bd4cb7cf9b55ee7ceec96e3,2024-04-08T22:47:26.453000 +CVE-2023-42936,0,1,c18fe081f1c567d172866792cd7e269db74a129e365dc1e3a0f755df59e92d66,2024-08-27T19:35:06.893000 CVE-2023-42937,0,0,2548bd23d42243683fdde68d9d74c6694ce8fbfe2bf0789c6beda4910f3fe439,2024-01-29T18:33:19.387000 CVE-2023-42938,0,0,d25e9dc245eebb79595e4f006d6b9857b227133a3f844fb3d6037315be9ae599,2024-08-26T15:35:02.077000 CVE-2023-42939,0,0,0ce71ea134fae56f84234486eae9cf0279fa4b51651ae0082aafa52d86a864ad,2024-02-22T19:07:27.197000 CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f803c,2023-11-07T04:22:25.913000 CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000 CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000 -CVE-2023-42942,0,1,5f3d335907b121452b79893baeef6c48d60a98bb67df4e841c089c4a7d2bce1f,2024-08-27T16:35:01.703000 +CVE-2023-42942,0,0,5f3d335907b121452b79893baeef6c48d60a98bb67df4e841c089c4a7d2bce1f,2024-08-27T16:35:01.703000 CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000 CVE-2023-42945,0,0,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000 CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000 @@ -232415,7 +232417,7 @@ CVE-2023-42959,0,0,12f3e1f633059524305473e9c00809cb86b8280a007b09c56c5f657aca98d CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000 CVE-2023-42962,0,0,35794e89578ee19a4b7d15e17dbc849654eef14cc3d488dadb444cc2c1961a1a,2024-04-08T22:47:42.510000 CVE-2023-4297,0,0,047ed4f9023e2ddaed83a6b2684e12e7cb9df8581e91d1a9b5f1e7175f976ace,2024-07-12T16:11:19.193000 -CVE-2023-42974,0,1,e533b89095e00307725a1fdb223f251263e9bb3179273e0faa91ad23e594fafb,2024-08-27T17:35:03.187000 +CVE-2023-42974,0,0,e533b89095e00307725a1fdb223f251263e9bb3179273e0faa91ad23e594fafb,2024-08-27T17:35:03.187000 CVE-2023-4298,0,0,ab810df76a2277202e9d137fbb6d468184ab03ce560db2111fcd8ea05340303c,2023-11-07T04:22:26.147000 CVE-2023-4299,0,0,56850848a0f7603aacc0a3b3f382ad7d3b749b8b52a9e1dddedc509864d473c9,2023-09-06T20:13:32.917000 CVE-2023-4300,0,0,8817ce258a8663a85f68378b3ba202ca1a6a1e67b5082493ade435e56ecc4599,2023-11-07T04:22:26.350000 @@ -232645,7 +232647,7 @@ CVE-2023-43470,0,0,17d35487c84783e73551dd1e340a28fdad09c072567b02a75a72d522739fd CVE-2023-43472,0,0,a3008b309ff857d10385bb0be4ee0eb4e9b0900adc392c74326123abc8303cf0,2023-12-11T15:32:59.420000 CVE-2023-43477,0,0,0c74ac00cc1ee8f6c145de162b98bc7d8776c1dc19ab5c8a19701bfb74cb49ca,2023-09-22T18:37:02.227000 CVE-2023-43478,0,0,c43004e7643e046e5e2c9d48aa06e90357a6d95e192814361f05a486c7b542a0,2023-09-22T18:36:45.253000 -CVE-2023-43481,0,0,4cee0e3b6a151c61abd07f6e6174e10799d8ce4062bbfa651f61bb758ced5296,2024-01-04T16:15:04.757000 +CVE-2023-43481,0,1,faa16b4f46dcdc0114be0dc9597ba626c5e87f23f98df512a29c2b5826b54935,2024-08-27T19:35:07.137000 CVE-2023-43482,0,0,8fdc0252f8a99d357c7a9ff8cfbddf8addb596669b2c0bcea99d45decc176060,2024-02-09T02:11:03.607000 CVE-2023-43484,0,0,b8e1fcf13fb67bd37267e8c1ecc07c5eb977d2a46ec3271926523495750a7a82,2023-09-27T20:25:34.200000 CVE-2023-43485,0,0,9779c35ae12c96226abd89db56b2640ef955e735e375f87b41d64c824815020a,2023-10-17T20:31:53.560000 @@ -234246,7 +234248,7 @@ CVE-2023-45867,0,0,5db5da4730a3eda998a4fd6ce2a21c0f3484bbd84571954836990317e57f8 CVE-2023-45868,0,0,df1b586624033c287b172839b213cbc8ec979ba18d71fde3b01da0f77fe96b10,2024-02-22T19:06:44.663000 CVE-2023-45869,0,0,ae0033b8875e66831bd0fa49aa37f059d0cc638339d10a85f589d8c5031628cb,2023-11-14T17:40:53.637000 CVE-2023-4587,0,0,2d9161b0ba4b4b9f51444521be9ee96176e07c56f44d6bd3c1d677910159fe30,2024-08-02T08:15:22.973000 -CVE-2023-45871,0,0,2e135735e00a0c709dffad617a3bdd948c1f8a4cd033650457ce0d7ee49844c2,2024-01-11T19:15:11.530000 +CVE-2023-45871,0,1,cf2c19d8d9a1ab8bca7df10be3896fb36b75b63207dd8eecbb49b88c6aec0739,2024-08-27T19:35:21.703000 CVE-2023-45873,0,0,a568e54c26b58817453d7ca833079f4de460e9bdaf499179488e9f031ae443eb,2024-02-29T13:49:47.277000 CVE-2023-45874,0,0,15b94d1156a65969baf5a063838eca4cde85c5739f0df1171f246a13f786bc4d,2024-02-29T13:49:47.277000 CVE-2023-45875,0,0,3efc1082c0b736fd7c57bf3abd024d406442080e5966fe27818bbd3983788771,2023-11-16T17:35:03.380000 @@ -234986,7 +234988,7 @@ CVE-2023-4683,0,0,40cea1dc03eef3e027bc32dd2ae941f65bd936f05a85036cfc49b15f406884 CVE-2023-46835,0,0,25bbc68dc75b3ccf60a7afebb412eded7c69fc7a3dcead527835c06dc08953f7,2024-01-11T15:56:04.093000 CVE-2023-46836,0,0,f5ce4ff90551bdc127de2610cb54770c0ee6eeab88d256f3d330df3bb8f0a1ae,2024-01-11T17:09:02.020000 CVE-2023-46837,0,0,235eb49f4a5cfd2303e4d9fe86113f4253281fb598c82093310061fdb70ca753,2024-02-15T03:15:34.683000 -CVE-2023-46838,0,0,d176a634688ec7181914195d5218d266af2f621242005988cf5ca8ea14de5b97,2024-06-27T12:15:13.670000 +CVE-2023-46838,0,1,e55342ec982796174c93d42f4d3441b48151cf088d830e6cc56db632a8572edf,2024-08-27T19:25:43.650000 CVE-2023-46839,0,0,1a808652e9a7343069785a6af2d94cd968a541325faba3e9406c32c3e461ae80,2024-03-20T13:00:16.367000 CVE-2023-46840,0,0,414f448d32223fd7dafc164b5d31b23d9d751ec13d652ba81f3f62f368b8515f,2024-03-20T13:00:16.367000 CVE-2023-46841,0,0,69de2292f7b0165df885056be3cdde071d60eea027dc1314d310f07d8d34f1e0,2024-03-23T03:15:09.740000 @@ -235556,7 +235558,7 @@ CVE-2023-47673,0,0,d218e9ff40d1dabc1a11b798abb209aa18bd456a2ffbe0a79e8c3b1c157e2 CVE-2023-47674,0,0,d037f2c801f376e087cd11902ffecdce96b13b0c80dff5d6bbcc72eae0f877ac,2023-12-05T19:11:17.703000 CVE-2023-47675,0,0,2513c3c466d7a0735b46553db3e36b315fc2a468ae47310d44402be9b043abfd,2023-11-22T00:05:28.373000 CVE-2023-47677,0,0,0d47d24a0783fa97e3136ebd993535ab6463f78fdc896415168e62bcf64f882b,2024-07-11T16:01:17.057000 -CVE-2023-47678,0,0,24bd55d56e2c793ebd4c5ac7975c0fe498f554a4aeef6109fe09df2b67a90ab6,2024-08-02T22:15:20 +CVE-2023-47678,0,1,f461145a54c4a5650ccf2b274b91a0186af1e9e02224971f71c400d924f099d3,2024-08-27T19:35:07.937000 CVE-2023-47679,0,0,41ef2fdf64f784da3cb851d39f0fd3ca184e4b821a91b7732600662d29bd38a1,2024-05-17T18:36:05.263000 CVE-2023-4768,0,0,19aa57856f835335eecb8da166f4e46a330664ee22f9fc6d9887432e7a04c23d,2023-11-13T18:28:18.260000 CVE-2023-47680,0,0,874c2a1a0d92f7a091aaadbe25da5af4be50dc769067615192e66f0eaffd0951,2023-11-17T14:50:40.710000 @@ -235793,7 +235795,7 @@ CVE-2023-48122,0,0,d7663799271d9b8671c9e8024632d9a1befdf8c12075b57be56623e3b111f CVE-2023-48123,0,0,dd1aea47245fa2d050518fc4fc3449f6781cc40a54dabd7011f438fd7622068f,2023-12-12T16:11:35.730000 CVE-2023-48124,0,0,866d32958e3d7a2db79a2e717cbe1c07ce9af2b659dbc952114d9f926c90d469,2023-11-29T16:59:36.717000 CVE-2023-48126,0,0,e2b7ffa93043f668ea6fa72c22c0d0bc5af3237373db0412a2934afe676daa0d,2024-01-29T22:58:18.460000 -CVE-2023-48127,0,1,03652ce141961eeb1f38d87703d2353e4c04e568761d2425b0d101640aa1c3c9,2024-08-27T16:35:02.480000 +CVE-2023-48127,0,0,03652ce141961eeb1f38d87703d2353e4c04e568761d2425b0d101640aa1c3c9,2024-08-27T16:35:02.480000 CVE-2023-48128,0,0,3486511bc881101feb6722e4f06b94e77581a3c23eeec58635d0e7ab55ad6ea3,2024-01-29T22:58:33.717000 CVE-2023-48129,0,0,25e7ef256d120b221e541b49e58e27cf776efaab036d84b5c7226691b00b8eaa,2024-01-29T22:59:32.340000 CVE-2023-4813,0,0,a3129b3c7c051a7be512cd888ca923b35f285314ef7523597960184a4b4b1ad6,2024-01-21T01:49:46.697000 @@ -236704,7 +236706,7 @@ CVE-2023-49228,0,0,d5b9c8d3e4a5b9a6aebd50c02454ff2ea2937ca928a075b6d2cf9ec37d3ad CVE-2023-49229,0,0,274f5e76e0abf25dd952bfa2abc364ec937485698e496e95193eb5367d2ae070,2024-01-04T21:44:26.423000 CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf01,2023-11-07T04:23:10.377000 CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000 -CVE-2023-49231,0,0,c50f7d4edb51eaf2d8520b58a27247c21c0ddf7734872c602b4b992f1811e9ca,2024-04-05T17:15:07.567000 +CVE-2023-49231,0,1,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000 CVE-2023-49232,0,0,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000 CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000 CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000 @@ -236932,7 +236934,7 @@ CVE-2023-49578,0,0,554376a4a5e89af7792fb2e3caaee83c155712344a4b55572197b12bfc2f7 CVE-2023-4958,0,0,b9fc19622ba6df397f2314bb1498399d57a97d8d3d77e1be35cc528df3591ff4,2024-05-03T16:15:11.227000 CVE-2023-49580,0,0,815954f9407b74402abcfb36fe3f08f951a3ae3d064781c18823d1ab5df6702f,2023-12-19T14:50:39.843000 CVE-2023-49581,0,0,c752d9c8b49d3a50b30e010fb1e627be8921c15cd9f5ebf74ca53588cf11cd1e,2024-01-16T14:15:48.123000 -CVE-2023-49582,0,1,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000 +CVE-2023-49582,0,0,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000 CVE-2023-49583,0,0,2bbc4069f5dd786f8918873219f212a951808fc3c08912cfca16a05ba9ea4494,2024-01-09T02:15:45.140000 CVE-2023-49584,0,0,12b0484dfd67af5cdba226de40078067413392935bfd8575322e5980ac90dd4f,2023-12-15T14:26:47.663000 CVE-2023-49587,0,0,b72e8cc0e0b1f24503bc21b9e5a03faa03723a19fc8b810902b73346efe7215f,2023-12-14T15:41:25.777000 @@ -237854,7 +237856,7 @@ CVE-2023-51048,0,0,5560e3783d9082369523f182f161f5eb26f9aad5bab2d146f92658a2fb0bf CVE-2023-51049,0,0,8dc5d051d2f3cd5df2f9c92c1c1e261c9c88d3014ad02c5e51b5378ecaf8da8b,2023-12-27T21:39:12.257000 CVE-2023-5105,0,0,d388b66ac355d1115628ad1de3597e68e21811177eb6cd3320deb6c58ef2db81,2023-12-07T20:31:41.503000 CVE-2023-51050,0,0,ece9118b5f50fec020bff263f92f25947c7e093a2fd80383122218e48734d694,2023-12-27T21:39:22.713000 -CVE-2023-51051,0,0,ca508f2e9d970d62b062be524a920bb66ee5712fa28b2d735015af1febe3743d,2023-12-29T03:47:42.610000 +CVE-2023-51051,0,1,27afa7dfe3f1160823d72cc873f74b1376fa7f35f4997f69dfcd6a84736866b8,2024-08-27T19:35:09.037000 CVE-2023-51052,0,0,33add013c95d358cbb500a56cdae79fd65f49f3493ceff5a405792886b3fd13c,2023-12-29T03:47:49.743000 CVE-2023-51059,0,0,451467dbcfb211fa5b13377610fe49b5891ab40fdc8f73a47cfa382fabfb5c36,2024-01-22T20:43:30.897000 CVE-2023-5106,0,0,6df74482d700d157269bea0570e0ab6107619db69d31b65be9091ccfa5a787d3,2023-10-04T12:25:09.517000 @@ -238397,11 +238399,11 @@ CVE-2023-51806,0,0,a032ea9a655cbbf71e4c406d3dd2f2f2f5ee97657ff9aa1dac7294e33e2f2 CVE-2023-51807,0,0,99ef3d3c49895d82fb2535441c0e6ff60b70aecdee167dcb6dc525cb985ee546,2024-01-23T14:45:29.080000 CVE-2023-5181,0,0,64c0855e85d2fc43a5b611f652f0c3c44d9ac91c82903da4e09b03bb5ac71756,2023-11-14T15:33:05.033000 CVE-2023-51810,0,0,09cae7d3e16d061e8a2e4ef47f5597db8c1b0ae9bb9a7c67d9f3865adbf309fb,2024-01-22T21:00:02.100000 -CVE-2023-51812,0,1,120a768b771acbdbd4019fafe4ebf29261cfea75f6ed1dddf1d261acbd21c2c7,2024-08-27T16:35:04.757000 +CVE-2023-51812,0,0,120a768b771acbdbd4019fafe4ebf29261cfea75f6ed1dddf1d261acbd21c2c7,2024-08-27T16:35:04.757000 CVE-2023-51813,0,0,03a8407f76670dad8ee2f735bc03f059a1f48e563cfaabefcea4d8c0a87c4b78,2024-02-05T18:39:54.630000 CVE-2023-5182,0,0,36783ba17dd3ddcfa5aa268dccb5a3d40636c21121d2899e424b957a713f6407,2023-10-11T18:05:32.093000 CVE-2023-51820,0,0,7aa0f7d98725dd77268f0caeb4fb8d7e759133db0c7956115ba3b94b4e25c668,2024-02-10T04:11:00.587000 -CVE-2023-51828,0,0,5450dc4f59e37fb018fd61836bc727e30fdf149f617f54e060b2b01bdf473572,2024-02-22T19:07:27.197000 +CVE-2023-51828,0,1,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000 CVE-2023-5183,0,0,b93a57cbfd23c7656908cf8ce0c47fe83e4871febf63c360b65228bdb8fcae2a,2023-10-02T19:22:03.777000 CVE-2023-51833,0,0,b10ac15f68016bd5d4bd8d474cb15f2be07ff92fa1dfb1c5cbe6b8926dbb6e85,2024-01-31T23:32:20.930000 CVE-2023-51835,0,0,95cc4db7c615cdb1c602639e2e37c3a762bd3c301b530acb72f57667401f78e7,2024-02-29T13:49:47.277000 @@ -238532,7 +238534,7 @@ CVE-2023-52101,0,0,3c9ff6a037b24ee13732ed793e4e2445283898e3d6528f27e793968417483 CVE-2023-52102,0,0,56d96f80f7a616015abfd0c89b86c846d05ab3920ecd70af77dd2284e6faa7c3,2024-01-19T19:30:49.283000 CVE-2023-52103,0,0,ac629cc1c4afe2140dbfbeed5793356e2c4d88820065a9c68c818f7eeb511749,2024-01-19T19:44:15.580000 CVE-2023-52104,0,0,f049ca940874eb58ba54cef68934d63a04e4b3378dc9ae1bb4954f25a44ee8d5,2024-01-19T19:45:11.830000 -CVE-2023-52105,0,1,7fca37ca631a27b8dc8fe3b9940e54b91efedf447c5fd0587d260b590112a217,2024-08-27T16:35:04.960000 +CVE-2023-52105,0,0,7fca37ca631a27b8dc8fe3b9940e54b91efedf447c5fd0587d260b590112a217,2024-08-27T16:35:04.960000 CVE-2023-52106,0,0,8de975f58ebbe51b2b85cc1f1b45e0159aee5fee2d513835532c7a6ebc5ba60f,2024-01-19T19:33:20.873000 CVE-2023-52107,0,0,39206048e7d03c3372434b8186baf63858d5630fd81395c6a9393dcdf17a567c,2024-01-19T19:11:57.207000 CVE-2023-52108,0,0,d0ef93e4677a93a0950f5cbdee0799c1f0c0115e139c4cf9d328ddbe6231bbf9,2024-01-19T19:07:12.283000 @@ -238542,7 +238544,7 @@ CVE-2023-52110,0,0,96323098c9ea834d4a730f7f43afa5f6533440312e55c10c9bdcf4d918aa3 CVE-2023-52111,0,0,cdc38abd8bbfb59f44eeca63e5577ead02e993e1300e7af858fa500cb0d20fec,2024-01-19T19:13:42.033000 CVE-2023-52112,0,0,e75e854e3bc26755af7f80b46565bb4f5a216aca1f3fc34672efd34977391ccf,2024-01-19T19:13:08.447000 CVE-2023-52113,0,0,b97f3ffb948686565ce41dcbc6e0a8c05a47c70185627a50914b7ac047b6fb68,2024-01-19T19:12:32.047000 -CVE-2023-52114,0,1,a3f4ee633445fd514ccd6a15903cfffd32dcbd42a48c03d1d56d3860c928aaf2,2024-08-27T16:35:05.753000 +CVE-2023-52114,0,0,a3f4ee633445fd514ccd6a15903cfffd32dcbd42a48c03d1d56d3860c928aaf2,2024-08-27T16:35:05.753000 CVE-2023-52115,0,0,7e79c146fa74c777963a88ff3c064006c2d544ca21b33bb411b563977d09201a,2024-01-19T19:16:18.290000 CVE-2023-52116,0,0,0f432e26b81d6517447194a85ebee37d4b1514144ffa2535ef4fd5261b8d26e5,2024-01-19T19:15:46.013000 CVE-2023-52117,0,0,549bc792efb68ff9d9c74645bd61512615bfad33eacacf714efed0139a6956b0,2024-07-29T18:15:59.007000 @@ -239868,7 +239870,7 @@ CVE-2023-5875,0,0,f2c8ef142a9434046bbcde5934014da0496914fabd5fc32933d6b6e4b6f9dd CVE-2023-5876,0,0,15630470fb49e7e58a4a76c10feb92bcc4ffca0123c850c1d1dd3392b7b5a3fe,2023-11-09T17:52:34.940000 CVE-2023-5877,0,0,cae6ea24083edc0a9230f73e09527d3b166867e7375913b75a03f99c65ab96fb,2024-01-08T17:23:26.717000 CVE-2023-5879,0,0,01d855585e8e4dcb5976d609eaf70dee60d5f96f852935b14c230795b259aea6,2024-01-10T19:30:37.647000 -CVE-2023-5880,0,1,af93876f292357a1cc430e87b699356327189d8165c165b0934bc8945eb81e63,2024-08-27T16:35:06.783000 +CVE-2023-5880,0,0,af93876f292357a1cc430e87b699356327189d8165c165b0934bc8945eb81e63,2024-08-27T16:35:06.783000 CVE-2023-5881,0,0,76c545895df6f4a825518ed006672e96b141cbbaa09742fe59c1d7cece581b8c,2024-01-10T20:26:45.550000 CVE-2023-5882,0,0,4959d9dfc73e7a34c96632349b138d2c951e4c354db8d4e6848b0dc18864c099,2023-12-21T19:50:45.183000 CVE-2023-5884,0,0,8ba598598db51592abc8d0d1ad7ed586ff334c41f47bc13ba93d7fe4d2805681,2023-12-08T14:49:31.140000 @@ -240295,7 +240297,7 @@ CVE-2023-6352,0,0,0d88b3591851e0b6fd9ec6baeeff1a35e9a6309d8954b935ebedc1b41f0f73 CVE-2023-6353,0,0,410080c76130e9beb7a2d40b2e86eb2e686850b81a11f9ea52b472b62040e73b,2023-12-06T18:18:09.320000 CVE-2023-6354,0,0,89b5389e23cd7e1b7d84ff66e83b00f749f7e12e17844840efcd02e46ca335d9,2023-12-06T18:18:01.950000 CVE-2023-6355,0,0,1f161a865de45e80e322e101a29fd35a2e726fca94b84f76f600180f53074604,2024-01-02T15:26:45.317000 -CVE-2023-6356,0,0,2fd2a467af68a9349dd0163edea58127971025b0e54e96ba131a6eb686301a8e,2024-07-08T18:15:04.350000 +CVE-2023-6356,0,1,462ca07057038b51e0aa4c1e2ad2a7d91052530a0398c7216231503421e3beaf,2024-08-27T19:22:33.193000 CVE-2023-6357,0,0,922aa33d69dfb57ab51adf02ab0b79ba8972c33eecc3f54e7b4cba6ee2b4cf0a,2023-12-11T20:49:14.117000 CVE-2023-6359,0,0,dc4b31625771af30b850afd13facd80e96ad5b76727dda84977b54cd8dc4afd1,2023-11-30T20:36:00.537000 CVE-2023-6360,0,0,7ebf7a0996aa604ca0e37b1bb629610295b5e95328fe4cc64d0814601832e864,2023-12-06T00:38:20.297000 @@ -240449,7 +240451,7 @@ CVE-2023-6532,0,0,44972a9aaa8b97e5656a7157ac74bde56edc9712f5f8e7cc323b7f605c6b8b CVE-2023-6533,0,0,dfcad6aa28cf8fca2713f13f08a05a0d6546cbbb4bbeb8091e2849afb08a4ad1,2024-02-22T19:07:27.197000 CVE-2023-6534,0,0,5f0dfdcb9f929ff0b7520043a1c55ae53709253c1bc046f2dcce650d8a570305,2024-01-12T14:15:49 CVE-2023-6535,0,0,b33e06863627e58b6fa2d11122d0ae013c360cdb31017f127054663d22393f69,2024-07-08T18:15:04.610000 -CVE-2023-6536,0,0,11e3f021ad01b47d5beaab46104502be39356051e28a99ea2c8058385d28afb2,2024-07-08T18:15:04.807000 +CVE-2023-6536,0,1,fec904ebb8306d2f4c67e541b887590dece41bd4da6150b93f3d4559950858d1,2024-08-27T19:23:14.437000 CVE-2023-6538,0,0,a9a54a8cf009f791dad92e4e281448c50d11a960aafad6f0f8ffb8cca053b0dd,2023-12-14T17:02:15.203000 CVE-2023-6540,0,0,8f87cfa2457d6bb0fb414fb770f451bb1d9c3c6672bf7d8a5df9f0f0dba7ce15,2024-01-10T20:23:28.493000 CVE-2023-6542,0,0,11c576806c1bbe301e44b77a2a78345f7d19542e9b00fa7b9afaff8511c7ebf4,2023-12-18T20:00:10.587000 @@ -240721,7 +240723,7 @@ CVE-2023-6862,0,0,73b0526dc80d57c50f8e0b6b71ea0c2548aab009b808eaa18ddf8d4e43c306 CVE-2023-6863,0,0,0b4633b0b0706837817be4547a71bb63916cf0829982289a349e8b14ca57f3cc,2024-02-02T02:35:16.677000 CVE-2023-6864,0,0,8067667905d2636381c7043a66857b7b8963934078ba15bdd8e0ea0ab598458c,2024-02-02T02:43:04.313000 CVE-2023-6865,0,0,b9c37e4d0ba7ec873822e966e08af99b2b77ababb4bc90dee769ee885b36f3e3,2024-02-02T02:35:21.153000 -CVE-2023-6866,0,0,88f2adf274dd9f0140a5212237628f753c21da09e1260a03e200c391d9bb0d50,2024-02-02T02:35:26.300000 +CVE-2023-6866,0,1,026f45b2ea006fe58e8046ec854bf61af71db436a55550677e807557477170ce,2024-08-27T19:35:11.017000 CVE-2023-6867,0,0,e3e533f686cb2fd910d1e7dc3c9fd7b13937ad3edd80102ad523cb4cf11cb2a2,2024-02-02T02:35:33.273000 CVE-2023-6868,0,0,338cad8c668583cd610935a543e25a5ac1c5568066e99fa943a852eb585b07c9,2024-02-02T02:28:41.527000 CVE-2023-6869,0,0,c23894de21c0ee58cff6be5d86c0cf3b818bb8805eaf7648088ca6fce5e12cbe,2024-02-02T02:29:05.143000 @@ -241122,7 +241124,7 @@ CVE-2024-0041,0,0,f01015c1847295eb8ef5594ac607bfd052422fd5f2a025c578fd946cd87d40 CVE-2024-0042,0,0,34dd3c01d1963f1fea072b87cd9587b8d1a38074bff497ca57638675955e85e5,2024-07-08T14:16:55.973000 CVE-2024-0043,0,0,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c477c,2024-07-03T01:44:34.730000 -CVE-2024-0045,0,0,ac422fdfb68e98cda45a9f3b2c924a0f3e621e205fe65a13c6a460bdf86b6e82,2024-03-12T12:40:13.500000 +CVE-2024-0045,0,1,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000 CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000 CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000 CVE-2024-0048,0,0,30be6e3e50a23d26d89c4e1eb4fa3a008e8939a0b64350645365e22b39561aec,2024-03-12T12:40:13.500000 @@ -241269,7 +241271,7 @@ CVE-2024-0254,0,0,de302d5d0ac8333076bd57fcf27799860f8cd9a96dba5b5199660ac1c1c9aa CVE-2024-0255,0,0,afbd5a5a3eb07143ea6a540bb91423dcbd767857bf8de1817834725449712d8e,2024-02-07T23:31:10.567000 CVE-2024-0256,0,0,b6e196abc3ef115e245cef14caea6a454bbd5c0b69e9db2f674093da7a713844,2024-02-14T19:17:28.387000 CVE-2024-0257,0,0,258560867c3af1d170317d16f1c8425f6150f32ff89af20f60461ed912252e8a,2024-04-18T13:04:28.900000 -CVE-2024-0258,0,0,5cac9bf9c404fbd31aa799e5057725261e1f8d37a0bb7cacc3953f6c6ea92708,2024-03-13T22:15:08.970000 +CVE-2024-0258,0,1,551a6ac7facbbca52d2de02756963fdecfce7587c74d0cb2ed34ee67b54e682f,2024-08-27T18:35:03.520000 CVE-2024-0259,0,0,d7f7cd8d41ff0a11823d2692a68cbbacf9b166214b16e2d0bdbff3371b417bb7,2024-03-28T16:07:30.893000 CVE-2024-0260,0,0,e1b3063fcd2c6d587cf09d60a45fc6e58a9abb0e8cb5ee779a27cc08a4f45cd8,2024-05-17T02:34:26.090000 CVE-2024-0261,0,0,b930dccca83fd43f2f5c9c9f3d5ed2e051b85cae130cf567cd9c1a232d3d169b,2024-05-17T02:34:26.227000 @@ -242220,7 +242222,7 @@ CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b80 CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000 CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000 CVE-2024-1273,0,0,77e426e491189decb08be6f5f41b23b0e6b37212aa753cdfd723b534f74aeb9c,2024-03-12T12:40:13.500000 -CVE-2024-1274,0,1,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000 +CVE-2024-1274,0,0,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000 CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000 CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000 CVE-2024-1277,0,0,fcab6e2e8f9b1f75d9aaae39d5201b9bda4fa39864a91dea7ad9be7bc3ae0884,2024-02-29T13:49:29.390000 @@ -242474,6 +242476,7 @@ CVE-2024-1537,0,0,0fbbb428e5d6117794e506ac85f652d85cda102f4ab0cd6387f39041bf7253 CVE-2024-1538,0,0,9fc7289e31e07bb56b9eb9128e9d1b6ba097152ab59ee8378f006443d204bcca,2024-03-21T12:58:51.093000 CVE-2024-1540,0,0,8f40fefee3c1d81db1cb09d26a976b077353ff3be5e21ad7faf7c16fdb309e83,2024-04-16T12:15:09.617000 CVE-2024-1541,0,0,b86c8271de1114c26151c28b4a73ced0b46884833e2a03ab8cf945b436dc1143,2024-03-13T18:15:58.530000 +CVE-2024-1544,1,1,72c4561a2f6f9312b7f0081c7f9795f87578b8288b82adf21b60ce4ab66bb119,2024-08-27T19:15:16.547000 CVE-2024-1546,0,0,25cf53baa34bb0b4805c5fe628b82b62aabfaaa6638a62497af9e0de14b093ff,2024-03-04T09:15:37.650000 CVE-2024-1547,0,0,8590deab7ee2956de6a0ef76618a6a96ff52727cdbc8e57258f00f60bb5d5bd4,2024-03-04T09:15:37.740000 CVE-2024-1548,0,0,6eee3f01728ed0fd4a2424a0afe7c369619c5f5c30c8c9a39afa9061aca1df3f,2024-03-04T09:15:37.787000 @@ -244209,7 +244212,7 @@ CVE-2024-21891,0,0,43cd3c587046828ef679aa8aab18a78abfa7e42f02c7b966a4e2fcb63257f CVE-2024-21892,0,0,b66f3720c2f8a6ca915b3a29134f8ea92c61757569ab02f4e0972950cde5a9ef,2024-05-01T18:15:13.610000 CVE-2024-21893,0,0,5d8ce33d1c55fcf2beea2facee684393ccb80962bcd0328324d1b1c6e19de8a2,2024-08-14T19:51:42.643000 CVE-2024-21894,0,0,99d4be035674fd6f5aa2e0bb3c54ccc20c81ba516b5e4a7075a4f68df66ede3d,2024-07-03T01:46:56.430000 -CVE-2024-21896,0,1,e5ee458c4fdcb804ce384ce01bebd179e3ae066792496cc0c6eb52547c53fb06,2024-08-27T16:35:07.720000 +CVE-2024-21896,0,0,e5ee458c4fdcb804ce384ce01bebd179e3ae066792496cc0c6eb52547c53fb06,2024-08-27T16:35:07.720000 CVE-2024-21899,0,0,ea2bec435e523de6db6aefd008c9f2a8d3114c121ab32f7f7c7d657ac45c9cc0,2024-03-13T14:25:02.043000 CVE-2024-21900,0,0,4a0954c4dc8c82825eb9602fc119b1b6a8fa3cc787c21459fb57ecdb0f42c7e0,2024-03-13T14:24:02.157000 CVE-2024-21901,0,0,2e3365239da0866c80c17edf651e9957c764643b06c562ba356a811a2c94a337,2024-03-13T14:23:12.393000 @@ -244733,7 +244736,7 @@ CVE-2024-22625,0,0,09ba919b555657d9041c71d104040a9638ad2a55d4ac570ca3cb5ff9ca4f3 CVE-2024-22626,0,0,b2d09ee8205b56693dca117236e4222a308d96c05721ec5e28000a67ed25cfd7,2024-01-19T14:40:09.903000 CVE-2024-22627,0,0,7de1240a28417cbc53b0ae0bc15d5725aafb2c30be8715fae81f72db699db31b,2024-01-19T14:38:53.237000 CVE-2024-22628,0,0,c48e2ec55f18b02d5d682e8e3830e76341123221faa60f4082cbda6cff78fe53,2024-01-19T14:33:00.143000 -CVE-2024-2263,0,1,a810f756266a9365977cacb5d5b4fe3eb18e8365977682a26dd2cd3ec55153fc,2024-08-27T16:35:11.257000 +CVE-2024-2263,0,0,a810f756266a9365977cacb5d5b4fe3eb18e8365977682a26dd2cd3ec55153fc,2024-08-27T16:35:11.257000 CVE-2024-22632,0,0,a97332f0b173cc610cbf62f4df4cd14dbcbefc795dfe6e338a0059d8c9ab3926,2024-04-26T12:58:17.720000 CVE-2024-22633,0,0,62bbea01bbc9e791cb93aa09eb03c6d5e054ab6b131ba05c74d3ac37dac5c57e,2024-08-08T16:35:05.543000 CVE-2024-22635,0,0,b93c7bc1d12536d652dcc85ddd79edfb5c7213a29d94f8bd78c761d3d7145598,2024-01-29T15:57:23.770000 @@ -244865,7 +244868,7 @@ CVE-2024-22927,0,0,1e0f4fff1c087ec66ddb031ba972b653e6994a440487deb552c935f836b3e CVE-2024-2293,0,0,1f43c62daad8cea9745311b2a88bee3b6d51c898b8ab0f8dd55c247625cdf587,2024-03-13T18:15:58.530000 CVE-2024-22936,0,0,686bc27db4679c4d5207398a2aba21d31deab1df5003cc1bfb0b19af7610a9ab,2024-08-26T19:35:04.853000 CVE-2024-22938,0,0,7f7aaef8db8b163f161aa38efb4fcb3a06c8eddd8dbdbf018595b1fb835fd3c0,2024-02-03T00:30:37.107000 -CVE-2024-22939,0,0,9ea6ec8a34d79d465f0a4a16f2ff93fba35a4ecddf832d95a77f90c4b44519d4,2024-02-29T13:49:29.390000 +CVE-2024-22939,0,1,fa40a9ad0d9a07998c1b2beaf955f4059b2e71890e0f0e0db2834b6f4d832a94,2024-08-27T19:35:11.597000 CVE-2024-2294,0,0,45cbe5a242b4e6f15f66657918344b9947fa17359306b2613a42546dfde984fb,2024-03-17T22:38:29.433000 CVE-2024-22942,0,0,bed7fb7d476384db5d6cc701e65fd7410d4a74c3a1d5ece54cd874d3be676a5c,2024-01-18T15:15:47.273000 CVE-2024-22949,0,0,0fb23c63ba894e54cc7da946312dd68f1cf3862114d31edc13f496c98d5c8724,2024-08-26T18:35:05.060000 @@ -245033,7 +245036,7 @@ CVE-2024-23230,0,0,ddbb7859b4c1b994076995e0f94a6c532d5346bdce5f3bbe28c8464827620 CVE-2024-23231,0,0,0c006833f1467b383e93b7d07c3cef0ebd7c088db978ea80541620978106cd1d,2024-03-13T22:15:09.780000 CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000 CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000 -CVE-2024-23234,0,1,cf9cee47c5ddf4443c90581bef409e0907a72ec2106ee4166332684023ebc090,2024-08-27T16:35:08.620000 +CVE-2024-23234,0,0,cf9cee47c5ddf4443c90581bef409e0907a72ec2106ee4166332684023ebc090,2024-08-27T16:35:08.620000 CVE-2024-23235,0,0,8475456fe966a8434d45c9ecd97011b49e7b6d9a91cff5dc02bc68aaf295e889,2024-08-01T13:47:09.287000 CVE-2024-23236,0,0,35e1e8394e7b9f6ad4331abd77ccd4bc245703e2c3f094e21b2b9f6f0cc432ae,2024-07-03T01:47:39.753000 CVE-2024-23238,0,0,fd48b8741b126bfeb7cfbf18403f943f7768e37b33d158371b746f6d71b99a91,2024-08-05T20:35:04.390000 @@ -245763,7 +245766,7 @@ CVE-2024-24272,0,0,4b14a40c86d30bd4b4b5c3619fa514717e09115a8266eca11e7a200787f14 CVE-2024-24275,0,0,bf48a834dac897664e81f3748e0f4d5c238116fb25905911687313cd54945ebb,2024-03-06T15:18:08.093000 CVE-2024-24276,0,0,5140333f0f3ce7a82f9d915e370db57d18b1db0fa2de019f6fd8e7318dc67fe0,2024-03-06T15:18:08.093000 CVE-2024-24278,0,0,d7869ab6c919ec986039391f19367c9df30528566a3ce8a652c5c0ef74c710f2,2024-03-06T15:18:08.093000 -CVE-2024-24279,0,0,d6aa4883ec9752c8cbfad9bfaa7a087e80b33df7185a899352a75bf8b8985ea6,2024-04-09T12:48:04.090000 +CVE-2024-24279,0,1,b22eaf070f797d5199ab4939d0b1561987350af33b4eba21e4910bbae462641a,2024-08-27T18:35:04.047000 CVE-2024-2428,0,0,f184833127d40a3257c1a8462b863bcb6fd84f065fdcd9226171beea0b538ed9,2024-04-10T13:23:38.787000 CVE-2024-2429,0,0,bb9579e5fb707a5112fccfd7e64c52901e3e44384ceafa5a0281658740d435e7,2024-08-09T20:35:03.443000 CVE-2024-24291,0,0,f9a99cce2d5669fe488c53da57cec1a603932ca409a68a957e4a3be597d5560e,2024-02-13T20:13:26.593000 @@ -245771,7 +245774,7 @@ CVE-2024-24293,0,0,c875e8188ccf3b7557555abd825e181af9a9ca32c0aff4644dac65d414c40 CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000 CVE-2024-2430,0,0,c79cca8eeb2327c37f864866fd920048670109f57492fac8de77c9e62b23498e,2024-08-01T13:49:46.040000 CVE-2024-24300,0,0,388744db6c38cccadb0f3dab4d8ce8dfab7613b9109ff67770c2e72952f5ecca,2024-08-16T19:35:04.613000 -CVE-2024-24301,0,0,09fef4ec6b3f7e08d0238c798debb077539e76e61034c99c0f3a3241209eb436,2024-02-15T06:23:39.303000 +CVE-2024-24301,0,1,256e1ac7c5e57b966441832bc0186e8eec5e7968102bcacccc4a55d7062ca9ac,2024-08-27T19:35:12.480000 CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000 CVE-2024-24303,0,0,cd85a5d3f2b2d1dbd56e108e3a3fef9929c977d30264ca372079e7b09a9a8077,2024-08-23T08:35:02.017000 CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000 @@ -245968,7 +245971,7 @@ CVE-2024-24720,0,0,116148208b713005301f5cf40f7ed4d29a4a646b11c4e3748d94824457651 CVE-2024-24721,0,0,cc501af2f363293d6bbcb033e643fca22423d4b5f2a3dc57ffee4b6412c8c2b9,2024-08-12T18:35:31.143000 CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000 CVE-2024-24724,0,0,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9afa9d,2024-08-16T16:35:03.010000 -CVE-2024-24725,0,0,fa4c4ce65e4991dcf18e22afc18c407373bea4c35493c8cf2afcfe5d0757cc18,2024-03-25T01:51:01.223000 +CVE-2024-24725,0,1,abcdbf333e953117e91fbd719efd3f28f2197c31afd05d1b1f71cb089103575c,2024-08-27T18:35:04.830000 CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000 @@ -246258,7 +246261,7 @@ CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2 CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000 -CVE-2024-25081,0,0,13600305b93f84e08309226bade4a86ad3c418fa1a97dd09629fdf9d241f21e9,2024-05-01T19:15:22.183000 +CVE-2024-25081,0,1,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 CVE-2024-25083,0,0,9d2f407cabf3a12bbd22cd36b42859a90ce2fc840877d4b234c6f6f10f6ee54c,2024-02-16T21:39:50.223000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 @@ -246497,7 +246500,7 @@ CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9c CVE-2024-25461,0,0,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000 CVE-2024-25466,0,0,2faf3b324b5dce58436df6bdaa090161fa7f0a0215834608518ab712a3442436,2024-08-19T20:35:06.837000 CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000 -CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d45fc,2024-02-26T13:42:22.567000 +CVE-2024-25469,0,1,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000 CVE-2024-25501,0,0,323095296ad9ad2b7b65354e8dc713fb0ff55c81a387332b25d6d222ed3321f1,2024-03-11T01:32:29.610000 @@ -246618,7 +246621,7 @@ CVE-2024-25644,0,0,3219e2e709e527015a48516ae6dfaf602d72b63a8b92f510428759964fa2e CVE-2024-25645,0,0,5e73536a8c6d34e4b421ffd125622fb4637ca2ae5f29dc9f1d9e4ca68f957637,2024-03-12T12:40:13.500000 CVE-2024-25646,0,0,f96a3838d7373a7e4c4d8dbfc1fa5fddee970ebb06619f04a6a27f836ef12886,2024-04-09T12:48:04.090000 CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000 -CVE-2024-25649,0,0,78e924f5d41e5f05e296cc03dc3adfffa64606ad0d931d33e585d324f935d2d4,2024-03-14T12:52:09.877000 +CVE-2024-25649,0,1,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 CVE-2024-25650,0,0,01debd251b64ab98dbfb6f9755755f4a861dcf15301c1f9d4cc42c00838c070f,2024-03-14T12:52:16.723000 CVE-2024-25651,0,0,141eb7237f8672075adb36d537e4b6bf696c6664fba30930784d19aa3662f69d,2024-08-22T19:35:16.053000 @@ -246687,7 +246690,7 @@ CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e CVE-2024-25746,0,0,aff52edf515c4bb2be3d1c40746c76af6ee680ba5675ccdda5ccab353d740e3d,2024-02-23T02:42:54.547000 CVE-2024-25748,0,0,9695611fe06c6e9b93fbd1431628cb47d8b27d680e5e9e22412df114dd60e72e,2024-02-23T02:42:54.547000 CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000 -CVE-2024-25751,0,0,f0421462e98f659f1769984b83a6c706a4a509a6b143972922469099fa24ac36,2024-02-27T14:20:06.637000 +CVE-2024-25751,0,1,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000 CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000 CVE-2024-25756,0,0,5722ed90ddd6ea44b0d78f4422f1171f91100e701c27eb307eef69402053a071,2024-08-01T13:47:52.407000 CVE-2024-2576,0,0,fdb4f97a9caf3f079cc26ac1dc9f3230cca21d1c295263c699c8006e571cd963,2024-06-21T19:15:30.217000 @@ -246730,7 +246733,7 @@ CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000 CVE-2024-25851,0,0,d67a62091ab95045024d9c69930163fc6933a08dd0957c710b2d2f48274fafad,2024-03-11T22:15:55.150000 CVE-2024-25852,0,0,1d0753f6ef753fc5d1ef48013e91f716bd2a2109414419ba6e7c96f787b8b0b6,2024-08-14T20:35:06.957000 -CVE-2024-25854,0,0,17ea666d7172d54584074846a82d44b7b8f164d46f64195f0b1bec22a7304545,2024-03-12T12:40:13.500000 +CVE-2024-25854,0,1,44f4f18783a518014d6e03af20d6bc0b5fc3bde62ddf95f44bcd216cec489e6e,2024-08-27T19:35:16.580000 CVE-2024-25858,0,0,a5cba2d53e795893941edce58201624f227bda6d68ecbb5cef1d602282ede544,2024-08-19T21:35:05.770000 CVE-2024-25859,0,0,5d3416d33baad6c5419dcee926eb2da1abee7dd2d03a2d827cc53b262fcccd60,2024-02-29T13:49:47.277000 CVE-2024-2586,0,0,71d47abb08c7e463323230f7e49ea5f345cb538a7006733d07a2afa950cd9ac5,2024-03-18T19:40:00.173000 @@ -246742,7 +246745,7 @@ CVE-2024-25868,0,0,79e7e664441558838d5a1bb760dc0511d86ac2459634e03e0e20d259b84c2 CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb467,2024-08-01T13:47:55.047000 CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded5337,2024-03-18T19:40:00.173000 CVE-2024-25873,0,0,b0ef6e77600c842b742f164755ad8cfeb8283e0b096faea6d4ca3226ee47f51d,2024-08-26T19:35:23.777000 -CVE-2024-25874,0,0,6d2389bddde8527bf2136be3df99fb38d1df3f190ca0f8297eea242b1fbad855,2024-02-22T19:07:27.197000 +CVE-2024-25874,0,1,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653257,2024-08-27T19:35:17.383000 CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000 CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000 CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000 @@ -247242,7 +247245,7 @@ CVE-2024-26521,0,0,7985e5a46b5dbb7cac5d9bc8fb1bd033c53432230144c1b88c935a11b26cd CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000 CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000 CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000 -CVE-2024-26540,0,0,6576c4885606d2c13376308bfe770084b7f2e54af2c02ae0a3e8966e16709f35,2024-03-15T12:53:06.423000 +CVE-2024-26540,0,1,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000 CVE-2024-26542,0,0,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000 CVE-2024-26548,0,0,a14221a020c4eadf543d91f52da71379b261a56fd8977996e8b1456e032b4731,2024-03-01T14:04:26.010000 CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000 @@ -247986,7 +247989,7 @@ CVE-2024-2728,0,0,894b3321a99e458969cde3c150a59b05eb4a60d79495148d5d2320daac930a CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 CVE-2024-27281,0,0,7f2b0f122766f676aed91ef9250b5865f45069fd8c6cab642c57fb3b624ebb3f,2024-08-20T14:35:05.757000 CVE-2024-27282,0,0,f669cfc684d64012ac673e23e33d53feb594d1f7a791cf168d4f1b5ba5e9d336,2024-05-14T16:13:02.773000 -CVE-2024-27283,0,0,fdbc894980293705e171221d68f90a1ff1ab870564c26395a8794e3b1fa7abdb,2024-02-22T19:07:27.197000 +CVE-2024-27283,0,1,447fecf972714152bd28f99db74ce906ef9cb660eeea6370cb0ec328ad746101,2024-08-27T19:35:18.260000 CVE-2024-27284,0,0,241491a708be706e7f2c13ff6e90e676355e3e9263bb0e5d018a757f3dac5346,2024-02-29T13:49:29.390000 CVE-2024-27285,0,0,0fe4482c13c2e3db37265fee5caab7ccfcdd141d862d09da03f598c92197dec9,2024-03-21T03:15:48.103000 CVE-2024-27286,0,0,9a158c3c4e73ffe42dc0048111eb063701f88df28c22761e894309b2074d3442,2024-03-21T12:58:51.093000 @@ -248253,7 +248256,7 @@ CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfd CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7df4,2024-08-01T13:48:43.923000 CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000 CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000 -CVE-2024-27703,0,0,3a3573ff5860638356c3adca622c2c9c4efa92e7fefb084eae2ad570942a8faf,2024-03-14T12:52:16.723000 +CVE-2024-27703,0,1,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000 CVE-2024-27705,0,0,538b62798ffb3deeb490d879f6c2b0551b7d4dbd846704c9743ab7991d01d3a0,2024-04-04T12:48:41.700000 CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000 CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000 @@ -248267,7 +248270,7 @@ CVE-2024-27715,0,0,b53060ac5f161ba9f8c11867640af89e771d5c1bd0a1ca5106a6746844ca1 CVE-2024-27716,0,0,b641573cb295179e8a45c3c6f4e5e6326128a1395653bab45519462f6e6492de,2024-07-08T15:49:22.437000 CVE-2024-27717,0,0,24b56efd365305b6bc14b31a5e0ebd3ded5b43adf71ab9f369b01e76538e669f,2024-07-08T15:49:22.437000 CVE-2024-27718,0,0,348ef178d7c72ea2bf9561abf13cadc3c1ef45743840695e6b53f9dba8489836,2024-03-05T13:41:01.900000 -CVE-2024-27719,0,0,cc91452d4b82f581b97b47b20481d35d29255b9662a7f1b32120fdd873effa3d,2024-03-28T20:53:20.813000 +CVE-2024-27719,0,1,fe8b836b0fe7e61cc41cd2c649b06140ddc642945672fc471d8dbd746e0bc2f0,2024-08-27T19:35:19.763000 CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c74d,2024-05-20T13:00:34.807000 CVE-2024-27728,0,0,60809830dda72755597fa9fd74cfe701dd5e424bcaf4e985376fe34c8dec441f,2024-08-20T14:35:06.747000 CVE-2024-27729,0,0,ebfc21812e929fc7a4596a0d8e7f868174feb579c24c8114e70bb1b1da144d44,2024-08-19T13:00:23.117000 @@ -249351,7 +249354,7 @@ CVE-2024-29243,0,0,03ec9bb493566015f908bfaebf75ec5d5aedfc39bbc77e2ee770fb19383b2 CVE-2024-29244,0,0,c908da2e34e19d3bf4dc14658c376ac3db45990ef773baf7dc70268f442bf6ab,2024-03-21T15:24:35.093000 CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b70,2024-04-02T12:50:42.233000 CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000 -CVE-2024-29269,0,0,f0b7f6af9974eb98ed7751e3f7e030827510317d8457db1027583e2507300e21,2024-04-11T12:47:44.137000 +CVE-2024-29269,0,1,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000 CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d38b,2024-05-17T02:38:37.557000 CVE-2024-29271,0,0,b4d3906e78736be6eca15d6469d3358952e211c417b217d384055581eda6bf29,2024-03-22T12:45:36.130000 CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000 @@ -249406,7 +249409,7 @@ CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f3 CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000 CVE-2024-29421,0,0,c6dafd45a8c53dbcd9097903b14403adcbaf4c0772c34ab01e88eb134a14b126,2024-08-19T18:35:07.660000 CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f48,2024-05-17T02:38:38.790000 -CVE-2024-29432,0,1,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000 +CVE-2024-29432,0,0,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000 CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000 CVE-2024-29434,0,0,2d35bfe8233ada26f52a8aa24ec4bb94ada1e07f5e74fe641dc47a96ca48d619,2024-04-03T12:38:04.840000 CVE-2024-29435,0,0,875cbdaf24fc385b5e7a9e6b4648f22f1ae4b6f76f07a45f82a4354af5229b55,2024-04-02T12:50:42.233000 @@ -249469,7 +249472,7 @@ CVE-2024-2961,0,0,ba64cd4241d15888be6cf9d01156608d47fe1966db4c3566a7554d9512772f CVE-2024-2962,0,0,70639fb2ff14ea321a660aad1527d4dafa66ceaf617d2db01badc90928927f12,2024-03-27T12:29:30.307000 CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7c0,2024-03-29T12:45:02.937000 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 -CVE-2024-29640,0,0,a54790ba2b7cb079e0b2a0116aa04e440cc656e156f794122dac80e58328a303,2024-04-01T01:12:59.077000 +CVE-2024-29640,0,1,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 CVE-2024-2965,0,0,695a2f4a5898798fb311965c87e04355b559271ed2851691e85a6cb305dd485e,2024-06-25T11:15:49.873000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 @@ -249477,7 +249480,7 @@ CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 CVE-2024-29660,0,0,92c6a0243a2c1471ce3712ba9ce2ea71347605bcd635b1e9cc6bc9d49c7bb0d5,2024-07-03T01:52:29.550000 CVE-2024-29661,0,0,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515ed30,2024-08-01T13:49:32.940000 -CVE-2024-29666,0,0,a67e8622ed74011ff249c5e68e53374a60af6cb3676ee7edca6fb573c3e202e4,2024-03-26T12:55:05.010000 +CVE-2024-29666,0,1,f5df78ffef64555b69793081fcf39d87c7422114afd34dcf4903064db05a537c,2024-08-27T18:35:08.177000 CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494dc8,2024-08-01T13:49:33.747000 CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000 CVE-2024-29672,0,0,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000 @@ -249701,11 +249704,11 @@ CVE-2024-29933,0,0,a2e3d1cf5c50df2ac8175fafc642d7883c46bae57acc8a66654cddda0ffe6 CVE-2024-29934,0,0,603ea29f7cb90bc84b60c254e2a54847f63d77d764b8ecb0fc2099441a608e41,2024-03-27T12:29:30.307000 CVE-2024-29935,0,0,2df58335532d2e0910d7fe960733b7807b7534e2adf23696be83fbb2aa39d74d,2024-03-27T12:29:30.307000 CVE-2024-29936,0,0,92849cd372884d285333ed69741c55a39f25096328d4160949a4c94f43a34be2,2024-03-27T12:29:30.307000 -CVE-2024-29937,0,1,cb939420c8aa9def2c7d8c3ddc741ff1105375d352c7fe1c0b407f39d0286abc,2024-08-27T16:35:11.020000 +CVE-2024-29937,0,0,cb939420c8aa9def2c7d8c3ddc741ff1105375d352c7fe1c0b407f39d0286abc,2024-08-27T16:35:11.020000 CVE-2024-2994,0,0,aaaf2c75d5a02f7deaf00b12c93e19a053ed46c0dbf5e453ed92362aa436eaf9,2024-05-17T02:38:41.503000 CVE-2024-29941,0,0,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3feda,2024-08-01T13:49:37.723000 CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63e02,2024-08-12T17:35:03.860000 -CVE-2024-29944,0,0,3fa6ec384cbcdc2b68322665bb7e7634f0ececbbfbd7ee0e2dbe62e4f2104876,2024-05-01T18:15:18.987000 +CVE-2024-29944,0,1,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 CVE-2024-29946,0,0,140bcfc073bda94d7ef4639048c1485e5634c470063153e21df7be99b584ee7c,2024-08-12T20:35:03.383000 CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000 @@ -250324,12 +250327,12 @@ CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2 CVE-2024-30598,0,0,5522799fef0d78c0e4f9a84a19e85c4ae628d4ef9d72cf9af60f6cc653518431,2024-03-28T16:07:30.893000 CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000 CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000 -CVE-2024-30600,0,0,fce9a7554c9f0f1b0d9fd07c807d160136a357b6c3f88bd0a420c4dbff802c92,2024-03-28T16:07:30.893000 +CVE-2024-30600,0,1,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000 CVE-2024-30601,0,0,9dfac2db560029d7902d4500ce4b1bb8d72ada7002cb3387b6f0aab6501b5284,2024-08-01T13:50:17.780000 CVE-2024-30602,0,0,9c40cbab2c38aaca828b52186223e1df82fdb31d9cb7460440b4892a59e5cdd5,2024-08-01T13:50:18.560000 CVE-2024-30603,0,0,4ed6cfbc1c794faff20a9402a19c1b8e2e0778b0d249fb5742f8d1e4a4dc2f88,2024-08-19T20:35:13.213000 CVE-2024-30604,0,0,060b968f0ffc4c388f441f2bffef7d326f7c284352f55ad52e5dcef963cc081c,2024-03-28T16:07:30.893000 -CVE-2024-30606,0,0,76de4dfc14eb6a90a04553ed0c6c96b418361d792a57179120d50d712b7e4c8c,2024-03-28T16:07:30.893000 +CVE-2024-30606,0,1,84836a047fa8bf7ec677c3313bb5423bd8318fbcc4aa2e83821f2d0bd157e4e1,2024-08-27T19:35:21.630000 CVE-2024-30607,0,0,3081b4056d2297b344e88d45dd81bdc04741e21824330f0904116519e8c0505f,2024-08-01T13:50:19.340000 CVE-2024-3061,0,0,4efd703c3bf27329551bb8c57b6ec5103d42ea334ef6d9361feb4d292b06b081,2024-03-29T12:45:02.937000 CVE-2024-30612,0,0,e42904b723a61ee315384c0049851285bcc87d076f88def1dfe4ab911cc568cf,2024-08-01T15:35:11.227000 @@ -250341,12 +250344,12 @@ CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000 CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000 CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000 -CVE-2024-30626,0,0,925435eedf5e0aaf58b72dd75ee5a85aebac0837c913b2b11ec6619fafacc6ae,2024-03-29T13:28:22.880000 +CVE-2024-30626,0,1,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000 CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000 CVE-2024-30628,0,0,dd5c2dbd465b741a9303d4905928e279a9f9c188a8cfae6b104c76db64b76117,2024-08-01T13:50:22.470000 CVE-2024-30629,0,0,dde9c072e6180c2884c3b2073d41ca0bf7b0e2064c1395f3d25c8643c5bf5d2e,2024-08-19T20:35:14.703000 CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000 -CVE-2024-30630,0,0,d1f2c24f30d736799fbd9614b05322c8af9640ffb03dab0097ee140dec9fb5dc,2024-03-29T13:28:22.880000 +CVE-2024-30630,0,1,9d4360141420d1184dad68eab5ca48c1910203b69531baab8f0a1633f37f80cf,2024-08-27T19:35:25.577000 CVE-2024-30631,0,0,41f838085add8cf1dec118fb7468de6b4fc9bce111467eb8baa174f9e9137432,2024-08-01T15:35:12.897000 CVE-2024-30632,0,0,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000 CVE-2024-30633,0,0,0e20fbff7533df843343aa1ca8784af549e42237ddf63007c09299ebacdd216c,2024-08-01T13:50:23.153000 @@ -250460,9 +250463,9 @@ CVE-2024-30861,0,0,6311d30f796f82bf3d64d6fdf692631cac6a43d1f01e8d19227025fedae3a CVE-2024-30862,0,0,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000 CVE-2024-30863,0,0,752ea16078bb63c47f206209c0fa643692a30c4ca55b96c3971f17949cd6ccfc,2024-04-02T12:50:42.233000 CVE-2024-30864,0,0,e04c733145e51290e0b4b760b29d1c4c2f4d6a6d5789b7b3dce3f78c10b78a59,2024-04-01T15:53:18.060000 -CVE-2024-30865,0,1,086ddea3051d95c24fd9bb62d2d2002b68b5fa407fb1d02593ab6a50d2ae94d8,2024-08-27T17:35:06.970000 +CVE-2024-30865,0,0,086ddea3051d95c24fd9bb62d2d2002b68b5fa407fb1d02593ab6a50d2ae94d8,2024-08-27T17:35:06.970000 CVE-2024-30866,0,0,fbc7fee320d7c2e8e3f30de496723c97a0df95b09f2b3b6897107e3f849d418a,2024-08-01T14:35:08.350000 -CVE-2024-30867,0,1,10db6a2918480cae65cfe287f5279b549ccab3273d6372c5f100fc7f7de51fc9,2024-08-27T16:35:11.577000 +CVE-2024-30867,0,0,10db6a2918480cae65cfe287f5279b549ccab3273d6372c5f100fc7f7de51fc9,2024-08-27T16:35:11.577000 CVE-2024-30868,0,0,40572fc00d47dcab0a02e3b982268eb31daa0424a9f9ba994981729836c30bef,2024-08-01T13:50:30.630000 CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d4f,2024-05-17T02:39:42.787000 CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000 @@ -250470,7 +250473,7 @@ CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000 -CVE-2024-3088,0,0,51ab9704d15ab90d01da05f05b0237355f0d32494879f94b17ccadec5ea4f6d0,2024-05-17T02:39:42.873000 +CVE-2024-3088,0,1,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000 CVE-2024-30880,0,0,96833c6da8b722f149fb59bda052ae3acf51b2dbf7db685f3dd13fb70ea6d96a,2024-08-01T13:50:31.417000 CVE-2024-30883,0,0,797b2441b715707191740c9fa7df6d1b293fbe4a72a5d05afa9b676f71d49814,2024-04-11T12:47:44.137000 CVE-2024-30884,0,0,453cca54472a26a8ca3d84c4d89a94e0d61ec7afc409128696362f32ae3d409b,2024-08-01T13:50:32.180000 @@ -250528,7 +250531,7 @@ CVE-2024-30989,0,0,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa93 CVE-2024-3099,0,0,df7fc1fafeab5e6abe2dc41108eea9b5e0baaaf382657013f126d487be466964,2024-06-07T14:56:05.647000 CVE-2024-30990,0,0,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 CVE-2024-30998,0,0,57a3e20b2db27a64aaab3601a5ceeb1ef9f704ed4059172be2576aa4d50b912e,2024-08-01T14:35:09.133000 -CVE-2024-31002,0,1,91060d363efbbd57c96984ebcb08d042f61fbe28b157d9f0ed5ab606981c65f7,2024-08-27T16:35:12.380000 +CVE-2024-31002,0,0,91060d363efbbd57c96984ebcb08d042f61fbe28b157d9f0ed5ab606981c65f7,2024-08-27T16:35:12.380000 CVE-2024-31003,0,0,4468ff6139dffd902d54dba282442b03643ad92e636b3ecc84e56f5157573f49,2024-08-01T13:50:37.813000 CVE-2024-31004,0,0,4704ee13f9f534d8c7bace10a79d7d4280ca43ae0178f7a716eda9d0db56ea6c,2024-04-02T12:50:42.233000 CVE-2024-31005,0,0,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 @@ -250545,7 +250548,7 @@ CVE-2024-31025,0,0,f6815681c00034cb26fb1b993f08da7051c7712a081b04f3f2c6c1b167cd8 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 -CVE-2024-31033,0,0,ad98d7e55b8cc6171b35a6136e6eb51847672500aa911f7497c7969c50af9164,2024-08-02T02:15:31.420000 +CVE-2024-31033,0,1,4d406f18763dd0b76dcad0c910670ccd39d0be934836d2f67e309de926070782,2024-08-27T18:35:09.280000 CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000 CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 @@ -250931,7 +250934,7 @@ CVE-2024-31492,0,0,b06ceb7c9f7436cf71baa2d42bf8bc10377af2691ce98c83805eb2ca0bae0 CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79af54,2024-06-03T14:46:24.250000 CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000 CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000 -CVE-2024-31498,0,0,2c6718643a91717514e2b2de53111a126eacf373a9c36aabb09803c11f338d38,2024-04-08T00:15:08 +CVE-2024-31498,0,1,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000 CVE-2024-3150,0,0,69195bb0268f0d9c44b64d544ae820662fe7bc6d09e60627c417b378085c3c15,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000 @@ -252354,7 +252357,7 @@ CVE-2024-33668,0,0,1057e9899f3d071fbe9469ff4d64f06b263f71484eb3414fb82aad54f0a34 CVE-2024-33669,0,0,9f9e4923b29b77e4df7ed4bfab7ff189f9617396636ad12f3335720e7b3f148c,2024-07-03T01:58:35.420000 CVE-2024-3367,0,0,3b87f70833bb8ccf4c6d89027b50770ba7c3694c19e37821dd6ef423c5078200,2024-08-26T10:15:05.743000 CVE-2024-33670,0,0,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000 -CVE-2024-33671,0,1,da512eb4b4b39df9e16d537dd03b866e635e50cab6e0152298a79bb951dc071e,2024-08-27T16:35:13.193000 +CVE-2024-33671,0,0,da512eb4b4b39df9e16d537dd03b866e635e50cab6e0152298a79bb951dc071e,2024-08-27T16:35:13.193000 CVE-2024-33672,0,0,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000 CVE-2024-33673,0,0,2e121fa93cd95e243645b6330a6810a785d78928d9f086479dd41d632f236bd8,2024-08-21T21:35:07.123000 CVE-2024-33677,0,0,c3a699c048bec4cee3b4b765cde86a17d71ee190ed8c41ad782a7d14e4a12a52,2024-04-26T12:58:17.720000 @@ -254022,6 +254025,7 @@ CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635 CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 +CVE-2024-36068,1,1,ff69b14eb3faffb5ef1fff6430c37e2dc6ce15280c21edfd6026d88004d8d5d7,2024-08-27T19:35:27.183000 CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,beb228b364090611e3dd2a48abbf51047e75d9810a4335130915a1f3e879cf31,2024-05-20T13:00:04.957000 CVE-2024-36071,0,0,1cf2d6d0e0350fe3ce54f2fd88bd10faece00caba8178bec17a18cc8abef5c43,2024-07-03T02:02:44.693000 @@ -254193,7 +254197,7 @@ CVE-2024-36264,0,0,14c280aba5df11c6b2ff8e262101089437d0333d307f52ff751b574a69563 CVE-2024-36265,0,0,3c8ae8461757f224b0e43678d6a3475afd39b129c52679abb832e768cb65918d,2024-08-02T04:16:59.920000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 -CVE-2024-36268,0,1,506bdd503241b054b98e469c8190767746cc55f82420c89947b6255b68cd420b,2024-08-27T17:19:43.653000 +CVE-2024-36268,0,0,506bdd503241b054b98e469c8190767746cc55f82420c89947b6255b68cd420b,2024-08-27T17:19:43.653000 CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000 CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000 @@ -254899,8 +254903,8 @@ CVE-2024-37367,0,0,fc795c705b992ce820b48f0d2d268ffab4e95ab1a4d3d8de7fa966ee5dbe9 CVE-2024-37368,0,0,40e16212115ad0befe218b2b8486634b2a8dd47d668209808f605a27a2118d54,2024-06-17T12:42:04.623000 CVE-2024-37369,0,0,4a0e873966c59da3f94ba1e845b6380e279da692e22304116efbf6efc4fb0a5d,2024-06-17T12:42:04.623000 CVE-2024-3737,0,0,26f370727648bebdbdb4484feb8794c0f4f6f501db44738bd488af3fc5030bc5,2024-05-17T02:40:05.887000 -CVE-2024-37370,0,1,5ef18b52731aa6f5eafd2b79804cbfc14d163aeb3b01f2fe5bcb0ee8a51881e9,2024-08-27T17:48:12.297000 -CVE-2024-37371,0,1,b4b24cabd070837a2dc75393291a5b36ca156817518c9185f5f4f50978f9fb40,2024-08-27T17:47:30.890000 +CVE-2024-37370,0,0,5ef18b52731aa6f5eafd2b79804cbfc14d163aeb3b01f2fe5bcb0ee8a51881e9,2024-08-27T17:48:12.297000 +CVE-2024-37371,0,0,b4b24cabd070837a2dc75393291a5b36ca156817518c9185f5f4f50978f9fb40,2024-08-27T17:47:30.890000 CVE-2024-37373,0,0,26dc5e4538b7cd09464c61fb65e8031c578a3247488f84f82c407880c1c7486b,2024-08-15T17:31:32.407000 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 @@ -255642,16 +255646,16 @@ CVE-2024-38543,0,0,cc494d9a26305e476b44305baa9260954effdb94d7f944121c7aae2dd1510 CVE-2024-38544,0,0,fa4907d5f56376ee8fa96880d6cd54bc49791710a31336b529a729183a380f75,2024-06-20T12:44:01.637000 CVE-2024-38545,0,0,b3eec4307a165a8e761ecbec896bee931fa02f92bed5dff09e89d7d519f80998,2024-06-20T12:44:01.637000 CVE-2024-38546,0,0,ac44fe90c8e3358cc4a9edd2c0abe9ebbeb5af9be9bf1c1fa151fdbe27da349b,2024-06-20T12:44:01.637000 -CVE-2024-38547,0,0,a6e983dd82a4102e0779290a9781ff8a77fc92418c98e8a7e645d17e74b52c3c,2024-06-20T12:44:01.637000 +CVE-2024-38547,0,1,0fd46903a324a4303feb1a86ea138cad132aadfdd07434ca776aa7fc69875c87,2024-08-27T19:56:36.727000 CVE-2024-38548,0,0,171e39d7367d49de534de52c4917669fe9bfa7833fe5361405e0ecddb170ac33,2024-07-03T02:05:11.107000 -CVE-2024-38549,0,0,1a7e3ad1adb040474b7e10deef14fe8f6ab9505d29ee7ae8ba08f7a5e9b4b11a,2024-07-15T07:15:08.820000 +CVE-2024-38549,0,1,23759d651c75e71c7abf259e3346236d359121811ca890a80b4abdbeb6d53463,2024-08-27T19:57:48.560000 CVE-2024-3855,0,0,7262bd57b27d1b3d3103ab661d1f7d85ee277817264f21911d91b4fa573922bc,2024-04-17T12:48:31.863000 CVE-2024-38550,0,0,3c81943b88da9d32a80e343d7d38e1cd6aa5f0c47582231155d312a40312171b,2024-07-03T02:05:11.837000 -CVE-2024-38551,0,0,4aa825ee5e452909b9b89d35c366bda32149f61c8a0c6f5023462b6413bc4c76,2024-06-20T12:44:01.637000 -CVE-2024-38552,0,0,c89ea8e1c5c5471d6e8a564af0ddf15ddcbacc0ddf6bc1dd7e9f5a0660378239,2024-07-15T07:15:09.020000 -CVE-2024-38553,0,0,7c7559da49a6a51c7a311816eb7b23aae370127e946c2a8cede1da85dc82422f,2024-06-20T12:44:01.637000 -CVE-2024-38554,0,0,fabf5046ae95932d2ee48257f80c09d056da1a888b9f02a760aba90611c983e1,2024-06-20T12:44:01.637000 -CVE-2024-38555,0,0,f9fa62ed78b6560e95202c4814b67442814d7e49c70ef811ca3c13c4cebd21e4,2024-06-20T12:44:01.637000 +CVE-2024-38551,0,1,0b4ae073cfbbe4b0131d149b2e79376d2a7c6c6f05a8b9f2866abb58f3a22942,2024-08-27T19:54:39.717000 +CVE-2024-38552,0,1,ecea6b3e5ffeb2a780fed1733ff56fe00eda9e1e0386e144355e86643e1cc270,2024-08-27T19:55:05.303000 +CVE-2024-38553,0,1,67acdd267e0537620d380889325d7755252cd88358a33906663ec52f56671176,2024-08-27T19:45:18.157000 +CVE-2024-38554,0,1,8b790c80ab51582e404589c54e66cd0bcb7aa34e72f7503df265277ebece0f02,2024-08-27T19:55:32.897000 +CVE-2024-38555,0,1,6b60bf420e9f83f409dbed38dc6879c7f03311b722325ce41530009471afd11b,2024-08-27T19:54:04.720000 CVE-2024-38556,0,0,51d124c836cc9e461c4d28a4538ed6a61c4cce78aafbbdb075464f88af8ced39,2024-06-20T12:44:01.637000 CVE-2024-38557,0,0,7cc96d52170d8ead986f63370ea66ce6fd7a730e01b3c6aa7cc946e65d6dd557,2024-06-20T12:44:01.637000 CVE-2024-38558,0,0,1aa2549c42096077d056cbab0d2e9ea0b310080aca3669912ae89eed3d6cbd3a,2024-07-15T07:15:09.387000 @@ -255691,19 +255695,19 @@ CVE-2024-38588,0,0,455a9b8a90760206a5fde630f5374c7117d3ca5dfaa729021f7df349dd474 CVE-2024-38589,0,0,054b7c93b18a32102a19731b8b9f7b53136e29764718c76bb09302eaee6404d9,2024-07-15T07:15:11.207000 CVE-2024-3859,0,0,f6a57f468f9800b8da982d83af2ac389f3f4d8b059886951b49765f213c508e4,2024-07-03T02:06:47.757000 CVE-2024-38590,0,0,5e1bf1fdf89348f141f9135cc15b76d863d47b4003bf5b9faeb1fa796664bf8e,2024-06-20T12:44:01.637000 -CVE-2024-38591,0,0,1478355333224382dce5c8f3ad8cc7cb191befc3c0297e282083cb6a1baa9158,2024-06-20T12:44:01.637000 +CVE-2024-38591,0,1,9995c38906c89d4c26c4d73a9253c7dc172d1edb03657ec8d80bc3d1b50a2d04,2024-08-27T18:36:09.777000 CVE-2024-38592,0,0,37134037ea24ea3ecf9f937f4db71a7eaa477c8ce6aa02c104d4a8d758f347b0,2024-06-20T12:44:01.637000 CVE-2024-38593,0,0,5810f9929219cd255d4f41416ce4d085acded54a81aae5569c879799f8b25fb1,2024-06-20T12:44:01.637000 CVE-2024-38594,0,0,7a5c19721e073a10649a5c50f88ac09eb2d8eab9e548a37238540908ab1b0b9e,2024-06-20T12:44:01.637000 CVE-2024-38595,0,0,832124134b5143ac4403d9ade527324b6e9e4e54c882604e73080b5bf34116c4,2024-06-20T12:44:01.637000 CVE-2024-38596,0,0,46720e55bcd9267a5978001cdabf468fbd47d88589f87bfbfc0df091a72949cf,2024-07-15T07:15:11.600000 -CVE-2024-38597,0,0,e5aa1ce317cbbf49c9d893d70736d99f030619900b3af8d94d9a10ad205366d3,2024-06-20T12:43:25.663000 -CVE-2024-38598,0,0,e18659bfe78473299157432842add9936fe82488b790d2081574f8dd460193ba,2024-07-15T07:15:11.720000 +CVE-2024-38597,0,1,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000 +CVE-2024-38598,0,1,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000 CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000 CVE-2024-3860,0,0,560f4bd3a6276dda10e535bade050cb4c38cd8e659ec70a4b99295b2c4085430,2024-04-17T12:48:31.863000 -CVE-2024-38600,0,1,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000 +CVE-2024-38600,0,0,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000 CVE-2024-38601,0,0,81635fbf930c5251f288be0221fe26c6b2030142ec4fb7ff358af458d07cd268,2024-07-15T07:15:11.943000 -CVE-2024-38602,0,1,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000 +CVE-2024-38602,0,0,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000 CVE-2024-38603,0,0,91e33ddcab32077ed7972b4ebaca436b45f3b2f56e92ba706348fc1e19f3c112,2024-08-01T19:58:13.143000 CVE-2024-38604,0,0,cac5cb47bab6a48f98903175dadd0b2cf9bfd6e5f8beb83a026ee24b6fe68ec0,2024-06-20T12:43:25.663000 CVE-2024-38605,0,0,f602dbd8b228460d18451b3d21699759c6e44ec89ce2e41ec5c3edf366b5b986,2024-07-03T02:05:15.990000 @@ -255967,7 +255971,7 @@ CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000 CVE-2024-39091,0,0,f4a8f0933c6d25f598eacdb963a85c2dcd7a3357118123548313549391b5d7d0,2024-08-13T21:35:02.617000 CVE-2024-39094,0,0,750555c9edd0083bf4bab9a297015b076d9622d923fd25a5d13752489b5b9d1a,2024-08-21T13:31:04.087000 -CVE-2024-39097,0,1,53091e824fb09ac566cf112a63931dfe02ab3df4ed18ffc60b19152585f1c5bd,2024-08-27T16:35:13.930000 +CVE-2024-39097,0,0,53091e824fb09ac566cf112a63931dfe02ab3df4ed18ffc60b19152585f1c5bd,2024-08-27T16:35:13.930000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 @@ -256029,7 +256033,7 @@ CVE-2024-3924,0,0,235edb1f62c7ed0711c125c27cb00d729af2f8ac46c7bf2f24b9a6a03738d7 CVE-2024-39241,0,0,accd1dd78fc247d99be43a8336696ac9932dfbe631d68c61bc60cbf3393ddd1d,2024-08-19T21:06:05.693000 CVE-2024-39242,0,0,0ce9eb7ec62fb5bee8b64b27a5019be0610d6047fe2caece098d1a76626bc65e,2024-08-19T21:06:24.177000 CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2d8b,2024-07-03T02:05:45.213000 -CVE-2024-39248,0,0,e5480a5b03e16e3b43b3677ad71515916200c7a077223114439b059657f45188,2024-07-05T12:55:51.367000 +CVE-2024-39248,0,1,bd438370022685a4151ebf84eacd73dcdc5ba59d6ceb4a7e44b285f898cf5c39,2024-08-27T18:32:45.907000 CVE-2024-39249,0,0,55419fdc735f4b5d3c5b1e858306972036cffb58a6300e012da45bf6f04a8bc8,2024-08-26T15:35:13.893000 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000 CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67fb2c,2024-08-01T13:55:47.607000 @@ -256149,11 +256153,11 @@ CVE-2024-39423,0,0,8c72be80e3c85b684216aef96277fce75a9c2e2c566be73887f1212d11fae CVE-2024-39424,0,0,243efb9cc10bea0f29adc08971658a5e72c18bfec9a9b14b5a01df0b19c33e3f,2024-08-15T17:25:25.787000 CVE-2024-39425,0,0,28e230ffc44c74bd5fea86e570ad4260fab01f825edd986d1d5f1805b2b51466,2024-08-15T17:17:59.783000 CVE-2024-39426,0,0,89e7428ead4414b9bdd760e275ee0d1f9df6042684f24e93cedce5e08d48724b,2024-08-15T17:17:38.680000 -CVE-2024-39427,0,1,b2934e8dae41c0c55c24f63c8682b3f35bb21b7895e9eac118f885e314738e27,2024-08-27T17:33:15.990000 -CVE-2024-39428,0,1,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f2fe,2024-08-27T17:39:29.090000 -CVE-2024-39429,0,1,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000 +CVE-2024-39427,0,1,557b55aed059a4b12cd7a567852cbd2b043bbb11d7f8b3c5a5f1bc408c118aa4,2024-08-27T18:32:28.710000 +CVE-2024-39428,0,0,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f2fe,2024-08-27T17:39:29.090000 +CVE-2024-39429,0,0,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000 CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000 -CVE-2024-39430,0,1,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000 +CVE-2024-39430,0,0,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000 @@ -256369,7 +256373,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000 -CVE-2024-39717,0,1,5bff20e776d919aa9302ca536a347b754ee87a4d4da8c8233bd51a9093bc293e,2024-08-27T16:15:07.400000 +CVE-2024-39717,0,0,5bff20e776d919aa9302ca536a347b754ee87a4d4da8c8233bd51a9093bc293e,2024-08-27T16:15:07.400000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 @@ -256583,7 +256587,7 @@ CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c746 CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000 CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 -CVE-2024-40395,1,1,624587188d5a0564c9287158c13d627e976a01f0beb15504a9506d1fb729ccdb,2024-08-27T16:15:07.583000 +CVE-2024-40395,0,1,2b3d55ea035ce2287aba45bb5c2769693f25b512e41e3ae4fa90ba0cd02e10b8,2024-08-27T18:33:14.247000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 @@ -257130,7 +257134,7 @@ CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ec CVE-2024-41270,0,0,af12a3d2be324bb3d9e2b16ff7d039367afc9e03066837308e275993680c0e05,2024-08-12T18:25:28.583000 CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000 -CVE-2024-41285,0,1,f9d8e2fe08b82d3f5c7f4ac42e37bd0268ac10deb583909c52659b72a2361eca,2024-08-27T16:03:16.043000 +CVE-2024-41285,0,0,f9d8e2fe08b82d3f5c7f4ac42e37bd0268ac10deb583909c52659b72a2361eca,2024-08-27T16:03:16.043000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7f9e,2024-08-23T16:35:06.883000 CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000 @@ -257224,7 +257228,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 -CVE-2024-41622,1,1,1e01fe20e0afeac7f8a3ed9d3610b5673cfc0264551b26e6a4cc2fa5e7982e34,2024-08-27T16:15:07.673000 +CVE-2024-41622,0,1,231621349909b4fe02afa7565e30fabb6d0f669719678c04b94764b05c01b9de,2024-08-27T18:35:10.613000 CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000 @@ -257992,6 +257996,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e CVE-2024-42845,0,0,41f949a7278b40e93c96bce086a04dddafae3cccde3fe1baa3e17a4aa01d20bb,2024-08-26T12:47:20.187000 CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000 CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000 +CVE-2024-42851,1,1,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28 CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 @@ -258231,7 +258236,7 @@ CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953 CVE-2024-43330,0,0,18c9cc1b418e02c0186c70603a33b75d4945832a6fdc2ddcfc149e88ac786f4b,2024-08-19T12:59:59.177000 CVE-2024-43331,0,0,6d28b8bc0904e0c3dd60c41d48cef3313c73e3f7ea773d2fece6fad186c8439a,2024-08-22T12:48:02.790000 CVE-2024-43335,0,0,dde6dc17375e74f502f7f2bfa9005d811d4652c2ebc27ff9b5ef0997127127d2,2024-08-19T12:59:59.177000 -CVE-2024-43336,0,1,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000 +CVE-2024-43336,0,0,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000 CVE-2024-43337,0,0,40b1547653629694d1f87683cec28c4d4ed17401d650c003966fbaf0b12fa6fa,2024-08-27T15:59:57.127000 CVE-2024-43339,0,0,66db28fe32caa7fdc3de193b1cfb8a374b117ab7f2a1a8dfd67efebf0a0a78c8,2024-08-27T15:58:31.840000 CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000 @@ -258289,6 +258294,7 @@ CVE-2024-43409,0,0,a42b7406eee825ee22fc12b5886825141398e49597504678e6e46efb8ce72 CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000 CVE-2024-43410,0,0,34c0de7d3aba2e2bf754c89b4a746899ed92baa2a863da3cba07091015a18558,2024-08-21T17:25:08.560000 CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c5063c5,2024-08-21T17:25:08.560000 +CVE-2024-43414,1,1,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 CVE-2024-43442,0,0,c91de21d85c5b198b68df6887497332dfae4e79fd9537263283e30abff2abab5,2024-08-26T16:35:12.860000 @@ -258333,9 +258339,10 @@ CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2f CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000 CVE-2024-43782,0,0,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d808,2024-08-23T16:18:28.547000 +CVE-2024-43783,1,1,68cfe59aff11ea0ac165b5589cd2ccc9f899d9b23a7fe8b7accfeb70a176ce47,2024-08-27T18:33:14.247000 CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000 CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000 -CVE-2024-43788,1,1,9499c4f05c4c09cadbb08a0deba9bf68c4aba5e542cb70aac4c35fcc36db21d5,2024-08-27T17:15:07.967000 +CVE-2024-43788,0,1,6ba7a069df1deadaf8a9df8f1dfeeeb285101da52fcf4af6ac8d627260dab172,2024-08-27T18:33:14.247000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000 CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000 @@ -258455,7 +258462,7 @@ CVE-2024-43908,0,0,37f71e1240c38f7f5d5430994391502a308fcc5874d7b6b8d1d03bb0a35a0 CVE-2024-43909,0,0,cf942173e7a980038b2545ed960379cf4d09253a719e1fb264ba55492ee93b8f,2024-08-27T13:41:48.467000 CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000 CVE-2024-43910,0,0,c87011ab8f713b3ebb471fd888664070478553118f1bf02ef6c18fc5aecc94c9,2024-08-26T12:47:20.187000 -CVE-2024-43911,0,1,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c71fe,2024-08-27T16:08:52.493000 +CVE-2024-43911,0,0,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c71fe,2024-08-27T16:08:52.493000 CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000 CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000 CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000 @@ -258500,9 +258507,9 @@ CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000 -CVE-2024-44340,1,1,694de177e0282d8353ff0ae968cf12f7e178780845540c54c0dd37ec854eaa8a,2024-08-27T16:15:07.760000 -CVE-2024-44341,1,1,d4e424ad86e25e88da43df54cedd229292707add11e0aaa0f996b896fbe96d3f,2024-08-27T16:15:07.860000 -CVE-2024-44342,1,1,6ffa7c5363a8bda159df95d627455b995e6a0adacdf268e01b0efb171f713310,2024-08-27T16:15:07.993000 +CVE-2024-44340,0,1,5530dc35edef952e8711559e514fbfa321059e19ea9cf4113733712ccfcddacd,2024-08-27T18:35:11.777000 +CVE-2024-44341,0,1,4394a7ab623822c8d7ae8a40120209f3c34ef26ebd88a169d40d7905474e555f,2024-08-27T18:35:12.540000 +CVE-2024-44342,0,1,d2c4a0923b5d002fea6dcefb46d4dbdd0a4fe3471bd6be04a38a6c07b2608317,2024-08-27T18:35:13.327000 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 @@ -258579,18 +258586,18 @@ CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e088 CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000 -CVE-2024-44932,0,1,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000 -CVE-2024-44933,0,1,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000 -CVE-2024-44934,0,1,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0bc4,2024-08-27T16:07:58.727000 -CVE-2024-44935,0,1,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 +CVE-2024-44932,0,0,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000 +CVE-2024-44933,0,0,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000 +CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0bc4,2024-08-27T16:07:58.727000 +CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 CVE-2024-44936,0,0,b9963badb762ccd078f0ff0276e3a054720ee02adaf519a8ed2637b289dbf485,2024-08-26T12:47:20.187000 -CVE-2024-44937,0,1,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 +CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 CVE-2024-44938,0,0,81d8c4fa2822291c31e2752229de00d1bfc6803d6c6c74b987910dc96d3f451e,2024-08-26T12:47:20.187000 CVE-2024-44939,0,0,df2a3231cc28f02dcccf984f7f5e5e4e9d5e3f87d2741a1f7e67c845a96a8582,2024-08-26T12:47:20.187000 CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81a4,2024-06-04T19:20:39.240000 CVE-2024-44940,0,0,f3c78670c961ed218069273846baa8ab159598a99ca4d39386baf88d3ac01c7d,2024-08-26T12:47:20.187000 CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000 -CVE-2024-44942,0,1,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 +CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000 CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 @@ -258601,6 +258608,7 @@ CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b220535343 CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 +CVE-2024-45037,1,1,dc3abcd06f6ee675ef0a41b95ee2573ea870bc5ec84bd2ec59385a0aaaed8788,2024-08-27T19:15:17.583000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 @@ -258649,7 +258657,7 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d CVE-2024-45256,0,0,4a4b83adefef92d16e6e4183f85729c0b386c1024d8d0fd2baaf64a1cf5545c2,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000 -CVE-2024-45264,1,1,2ad7fa5d245a9e53c333a3b14a15ed25ba75de4e2036f4415ee1805913d12be2,2024-08-27T17:35:08.307000 +CVE-2024-45264,0,1,bd0d2a78e6450ea9b4acfe4451f605c0cc149ce794d1dfe127d00787aadcafbc,2024-08-27T18:33:14.247000 CVE-2024-45265,0,0,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 @@ -259221,7 +259229,7 @@ CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e4674 CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000 CVE-2024-5179,0,0,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000 CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000 -CVE-2024-5182,0,1,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000 +CVE-2024-5182,0,0,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000 CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000 CVE-2024-5185,0,0,3d9097e9edd68b1a61ddf8b22d544b13320bd5fe9c392649fb66d80c69a658af,2024-05-29T15:18:26.427000 CVE-2024-5186,0,0,69118220a4589595e04a16dac1408d0d7061fc9b2dd45293e94f807b7f32a65c,2024-06-07T14:56:05.647000 @@ -259323,6 +259331,7 @@ CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7 CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000 CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000 CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000 +CVE-2024-5288,1,1,5de79d67173393cc3de65b536f846b2e40744ad08ee3650bed840ff02b1b527f,2024-08-27T19:15:17.797000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5290,0,0,adacdfd631af0a2d0e8f586387cac872823eb4764e0466b1013d4b9bdcf14abe,2024-08-07T15:17:46.717000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 @@ -259760,6 +259769,7 @@ CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773 CVE-2024-5811,0,0,da48fd72e5de418e87b54290fe68d41aecce53c1cabdd1300feebd9e1c56b865,2024-08-01T14:00:00.527000 CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000 +CVE-2024-5814,1,1,94074d9744717f927102d900b5554c4a2220a1cf6153da54641180a39c9e6bc9,2024-08-27T19:15:17.980000 CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000 CVE-2024-5816,0,0,3d67952ce4a1b2b1ece947260f0beee9de9f9da521a3f15a0343c5e1d47b81ea,2024-07-17T13:34:20.520000 CVE-2024-5817,0,0,e05abd62bd06ccb376baea6b1d5f924e4e6fb0941dae50b59d4aa5f4c769fe7a,2024-07-17T13:34:20.520000 @@ -259894,6 +259904,7 @@ CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b CVE-2024-5988,0,0,6a93e103554a4b2cea7532bb149420b2c5e22d63c1fab23818b5950d94f50a5e,2024-06-25T18:50:42.040000 CVE-2024-5989,0,0,5b8da9d53fdfd0fd3971e8489f4ae4ce0e952b56f28f99337bb24ad669904afb,2024-06-25T18:50:42.040000 CVE-2024-5990,0,0,815ffdec6ed9055e0c29635260b790d8ae8601700cacf3380cde4c3f20ff7240,2024-06-25T18:50:42.040000 +CVE-2024-5991,1,1,5f21d4fac46762b4d89f6869fc7d9b7fdb82ba7ff968eb711f41a5033f557fc7,2024-08-27T19:15:18.080000 CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000 CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000 CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000 @@ -259938,7 +259949,7 @@ CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc06 CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000 -CVE-2024-6052,0,1,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000 +CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000 @@ -260605,7 +260616,7 @@ CVE-2024-6973,0,0,9bcac54b07f64371109cf6c17f16f57c8cc24336c737269dc5d4e2a7b649db CVE-2024-6974,0,0,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e2c,2024-08-27T15:36:40.667000 CVE-2024-6975,0,0,d63385a625ec15f0611b849f606ef80820f5aa79d2e921c6e99e1d59f30cf02e,2024-08-27T15:40:05.223000 CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdfe7,2024-08-27T15:41:15.443000 -CVE-2024-6978,0,1,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000 +CVE-2024-6978,0,0,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000 CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000 @@ -261076,6 +261087,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 +CVE-2024-7720,1,1,fa989408cdbda8a784c073a3419b0a9bde2bfe617872825f0e9574c0403c663e,2024-08-27T18:33:14.247000 CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000 CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000 CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000 @@ -261229,7 +261241,7 @@ CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68 CVE-2024-8011,0,0,b9eccdb873cdee0aa4aaf727a8d55e87a8f1a6dcd35fe88e6cae24de39ee4994,2024-08-26T12:47:20.187000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 -CVE-2024-8033,0,0,a55cf019f91370d30ea7734ed696c6e008634912634c88c606ef5f6209b81cb2,2024-08-22T17:36:07.673000 +CVE-2024-8033,0,1,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 CVE-2024-8041,0,0,530afb8d20f30d401c1d7f8908c798a45edf30b2f924035dda7c4300ee7ef6f4,2024-08-23T16:18:28.547000 @@ -261243,9 +261255,9 @@ CVE-2024-8077,0,0,dfaba62e1a5ac86b8269d34e4d8f061b3115ba664d3b281f9df2a189f22367 CVE-2024-8078,0,0,56fa022d353460bea9cc13531e8ff39ff18a56376aa15fa3c7ad1544c4d78eb9,2024-08-23T16:18:28.547000 CVE-2024-8079,0,0,45e2451b8ff502b01a62e2eb189952370de6cb2828a8e3600f61fbc081041d88,2024-08-23T16:18:28.547000 CVE-2024-8080,0,0,c8da83ed651e2e78327dca04cb45f8efec07e44d550ef7a9ff0faf681234c986,2024-08-23T16:18:28.547000 -CVE-2024-8081,0,1,a5310bc7e9b22185784b602e8eec862129b29e3e8dd39db46315df64d68f05ff,2024-08-27T16:12:33.580000 -CVE-2024-8083,0,1,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa15,2024-08-27T16:11:35.730000 -CVE-2024-8084,0,1,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 +CVE-2024-8081,0,0,a5310bc7e9b22185784b602e8eec862129b29e3e8dd39db46315df64d68f05ff,2024-08-27T16:12:33.580000 +CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa15,2024-08-27T16:11:35.730000 +CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000 CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 CVE-2024-8088,0,0,59d209ebea916c4dc2d86b3c8215979f6261e01bc484ccba8dba82dfa07cf28c,2024-08-26T19:15:08.433000 @@ -261290,15 +261302,19 @@ CVE-2024-8166,0,0,f12f4299a569f15901062ca88855adc385daab485a9c5a1ac8234fa6d74f6e CVE-2024-8167,0,0,e1d76d41e7f83c83df1202942336f7e4e5679c0385cffbe5279207329dff3a19,2024-08-26T18:45:44.287000 CVE-2024-8168,0,0,9955e844b80349a9eb3954506e8959a22faf2c7afd6ad4972803d0a2ade5036e,2024-08-26T18:45:02.637000 CVE-2024-8169,0,0,2fe56196262642c44aec8bafd52bbf787b8c04f89d2046b461b5203375e75588,2024-08-26T18:42:36.070000 -CVE-2024-8170,0,1,e7028e0b405dbb20fdca4f12f7f80cdc8739f22dd67ad43d2100093929ab7ccd,2024-08-27T16:02:50.577000 -CVE-2024-8171,0,1,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ada6,2024-08-27T16:02:19.150000 -CVE-2024-8172,0,1,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000 +CVE-2024-8170,0,0,e7028e0b405dbb20fdca4f12f7f80cdc8739f22dd67ad43d2100093929ab7ccd,2024-08-27T16:02:50.577000 +CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ada6,2024-08-27T16:02:19.150000 +CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000 CVE-2024-8173,0,0,df3f4daf54afccb31b2d0dbd1ade86a4fd2b61ea5ed1b3d3f6de3c93aae29da5,2024-08-26T19:10:09.607000 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000 CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000 -CVE-2024-8199,1,1,88a2f93ef77df30eb07146b30b8614ae342c96eb66f77009b3946574d520bf06,2024-08-27T16:15:08.173000 -CVE-2024-8200,1,1,cbca5414004709de4917047b9bbb6b671cc8c12242707037aa87aa934dfcfb5d,2024-08-27T16:15:08.383000 +CVE-2024-8199,0,1,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000 +CVE-2024-8200,0,1,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000 CVE-2024-8207,0,0,498323e8227fa40c3fd29b85835950264192b60730f689cfc748d515dfd6f7ad,2024-08-27T13:01:37.913000 +CVE-2024-8208,1,1,c0546cf56f335de149e039eaf41ddcfe92498da6cf6c84b8fa1c52ddaf26fb1f,2024-08-27T18:33:14.247000 +CVE-2024-8209,1,1,55f7ec189eb87638165e40939313326ea0521e4ed80e56afdb88c580a7b1c999,2024-08-27T18:33:14.247000 +CVE-2024-8210,1,1,d8858e0da615a99ba4a7987d4afe11db96b004b714d3b7c008b8096e30056f73,2024-08-27T19:15:18.250000 +CVE-2024-8211,1,1,dd10850c7586b7f2b5b17b7368d910a3fefc07e7abe62303615c718ed57e06ca,2024-08-27T19:15:18.553000